Use After Free Bug in Linux Kernel's VXCan Interface
CVE-2021-47669
7.8HIGH
Summary
A use after free vulnerability exists in the Linux kernel's VXCan interface, specifically in the vxcan_xmit function. This flaw occurs after the netif_rx_ni(skb) call, where subsequent dereferencing of the skb pointer becomes unsafe. Notably, the canfd_frame cfd, which references the same skb memory, is accessed after it has been freed, potentially allowing an attacker to exploit this condition to disrupt normal operations or execute unwanted actions.
Affected Version(s)
Linux a8f820a380a2a06fc4fe1a54159067958f800929 < 6d6dcf2399cdd26f7f5426ca8dd8366b7f2ca105
Linux a8f820a380a2a06fc4fe1a54159067958f800929 < 9b820875a32a3443d67bfd368e93038354e98052
Linux a8f820a380a2a06fc4fe1a54159067958f800929
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved