We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-47670

can: peak_usb: fix use after free bugs



Description

In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni(). Reordering the lines solves the issue.

Reserved 2025-04-16 | Published 2025-04-17 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

0a25e1f4f18566b750ebd3ae995af64e23111e63 before 5408824636fa0dfedb9ecb0d94abd573131bfbbe
affected

0a25e1f4f18566b750ebd3ae995af64e23111e63 before ddd1416f44130377798c1430b76503513b7497c2
affected

0a25e1f4f18566b750ebd3ae995af64e23111e63 before ec939c13c3fff2114479769c8380b7f1a54feca9
affected

0a25e1f4f18566b750ebd3ae995af64e23111e63 before 50aca891d7a554db0901b245167cd653d73aaa71
affected

Default status
affected

4.0
affected

Any version before 4.0
unaffected

4.19.171
unaffected

5.4.93
unaffected

5.10.11
unaffected

5.11
unaffected

References

git.kernel.org/...c/5408824636fa0dfedb9ecb0d94abd573131bfbbe

git.kernel.org/...c/ddd1416f44130377798c1430b76503513b7497c2

git.kernel.org/...c/ec939c13c3fff2114479769c8380b7f1a54feca9

git.kernel.org/...c/50aca891d7a554db0901b245167cd653d73aaa71

cve.org (CVE-2021-47670)

nvd.nist.gov (CVE-2021-47670)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2021-47670

Support options

Helpdesk Chat, Email, Knowledgebase