CVE-2021-47668

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
17/04/2025
Last modified:
21/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: dev: can_restart: fix use after free bug<br /> <br /> After calling netif_rx_ni(skb), dereferencing skb is unsafe.<br /> Especially, the can_frame cf which aliases skb memory is accessed<br /> after the netif_rx_ni() in:<br /> stats-&gt;rx_bytes += cf-&gt;len;<br /> <br /> Reordering the lines solves the issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 2.6.31 (including) 4.4.254 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.5 (including) 4.9.254 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.218 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.171 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.11 (excluding)
cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*