CVE-2021-47669
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
17/04/2025
Last modified:
21/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: vxcan: vxcan_xmit: fix use after free bug<br />
<br />
After calling netif_rx_ni(skb), dereferencing skb is unsafe.<br />
Especially, the canfd_frame cfd which aliases skb memory is accessed<br />
after the netif_rx_ni().
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.12 (including) | 4.14.218 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.171 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6d6dcf2399cdd26f7f5426ca8dd8366b7f2ca105
- https://git.kernel.org/stable/c/75854cad5d80976f6ea0f0431f8cedd3bcc475cb
- https://git.kernel.org/stable/c/9b820875a32a3443d67bfd368e93038354e98052
- https://git.kernel.org/stable/c/a24476b37167816e6352ca1a2cf3769847774f70
- https://git.kernel.org/stable/c/e771a874076115df8bff27d325edfd2340e4ec69



