Use After Free Bug in Linux Kernel's VXCan Interface
CVE-2021-47669

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
17 April 2025

Summary

A use after free vulnerability exists in the Linux kernel's VXCan interface, specifically in the vxcan_xmit function. This flaw occurs after the netif_rx_ni(skb) call, where subsequent dereferencing of the skb pointer becomes unsafe. Notably, the canfd_frame cfd, which references the same skb memory, is accessed after it has been freed, potentially allowing an attacker to exploit this condition to disrupt normal operations or execute unwanted actions.

Affected Version(s)

Linux a8f820a380a2a06fc4fe1a54159067958f800929 < 6d6dcf2399cdd26f7f5426ca8dd8366b7f2ca105

Linux a8f820a380a2a06fc4fe1a54159067958f800929 < 9b820875a32a3443d67bfd368e93038354e98052

Linux a8f820a380a2a06fc4fe1a54159067958f800929

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.