In the Linux kernel, the following vulnerability has been resolved:
can: pch_can: pch_can_rx_normal: fix use after free
After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).
Reordering the lines solves the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-05-24T15:09:33.796Z
Updated: 2024-12-19T07:44:04.073Z
Reserved: 2024-05-24T15:02:54.824Z
Link: CVE-2021-47520

Updated: 2024-08-04T05:39:59.800Z

Status : Modified
Published: 2024-05-24T15:15:14.003
Modified: 2024-11-21T06:36:25.953
Link: CVE-2021-47520
