Linux Kernel Vulnerability in CAN Module by Linux Foundation
CVE-2021-47668
7.8HIGH
Summary
The Linux kernel contains a vulnerability in the CAN module, where accessing dereferenced memory after it has been freed can lead to instability and potential exploitation. Specifically, after invoking the netif_rx_ni(skb) function, subsequent accesses to skb—particularly for can_frame cf—can introduce unsafe conditions. Revising the order of operations ensures that the integrity of the memory reference is maintained, ultimately enhancing the kernel's reliability.
Affected Version(s)
Linux 39549eef3587f1c1e8c65c88a2400d10fd30ea17 < 260925a0b7d2da5449f8ecfd02c1405e0c8a45b8
Linux 39549eef3587f1c1e8c65c88a2400d10fd30ea17
Linux 39549eef3587f1c1e8c65c88a2400d10fd30ea17 < 92668d28c7e6a7a2ba07df287669ffcdf650c421
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved