In the Linux kernel, the following vulnerability has been resolved:
can: pch_can: pch_can_rx_normal: fix use after free
After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).
Reordering the lines solves the issue.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-24T15:09:33.796Z
Updated: 2024-08-04T05:39:59.800Z
Reserved: 2024-05-24T15:02:54.824Z
Link: CVE-2021-47520
Vulnrichment
Updated: 2024-08-04T05:39:59.800Z
NVD
Status : Analyzed
Published: 2024-05-24T15:15:14.003
Modified: 2024-06-10T18:42:47.233
Link: CVE-2021-47520
Redhat