Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-47456— can: peak_pci: peak_pci_remove(): fix UAF

EPSS 0.03% · P8

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxe6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< 1c616528ba4aeb1125a06b407572ab7b56acae38affected
e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< 447d44cd2f67a20b596ede3ca3cd67086dfd9ca9affected
e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< 34914971bb3244db4ce2be44e9438a9b30c56250affected
e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< adbda14730aacce41c0d3596415aa39ad63eafd9affected
e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< 1248582e47a9f7ce0ecd156c39fc61f8b6aa3699affected
e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< 28f28e4bc3a5e0051faa963f10b778ab38c1db69affected
e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< 0e5afdc2315b0737edcf55bede4ee1640d2d464daffected
e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd< 949fe9b35570361bc6ee2652f89a0561b26eec98affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-47456

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
can: peak_pci: peak_pci_remove(): fix UAF
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: can: peak_pci: peak_pci_remove(): fix UAF When remove the module peek_pci, referencing 'chan' again after releasing 'dev' will cause UAF. Fix this by releasing 'dev' later. The following log reveals it: [ 35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537 [ 35.965513 ] Call Trace: [ 35.965718 ] dump_stack_lvl+0xa8/0xd1 [ 35.966028 ] print_address_description+0x87/0x3b0 [ 35.966420 ] kasan_report+0x172/0x1c0 [ 35.966725 ] ? peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.967137 ] ? trace_irq_enable_rcuidle+0x10/0x170 [ 35.967529 ] ? peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.967945 ] __asan_report_load8_noabort+0x14/0x20 [ 35.968346 ] peak_pci_remove+0x16f/0x270 [peak_pci] [ 35.968752 ] pci_device_remove+0xa9/0x250
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于内存释放后重用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd ~ 1c616528ba4aeb1125a06b407572ab7b56acae38 -
LinuxLinux 3.4 -

II. Public POCs for CVE-2021-47456

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-47456

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-05-22 · 63 CVEs total

CVE-2021-47477comedi: dt9812: fix DMA buffers on stack
CVE-2021-47493ocfs2: fix race between searching chunks and release journal_head from buffer_head
CVE-2021-47495usbnet: sanity check for maxpacket
CVE-2021-47496net/tls: Fix flipped sign in tls_err_abort() calls
CVE-2021-47494cfg80211: fix management registrations locking
CVE-2021-47481RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR
CVE-2021-47482net: batman-adv: fix error handling
CVE-2021-47480scsi: core: Put LLD module refcnt after SCSI device is released
CVE-2021-47478isofs: Fix out of bound access for corrupted isofs image
CVE-2021-47479staging: rtl8712: fix use-after-free in rtl8712_dl_fw
CVE-2021-47483regmap: Fix possible double-free in regcache_rbtree_exit()
CVE-2021-47476comedi: ni_usb6501: fix NULL-deref in command paths
CVE-2021-47475comedi: vmk80xx: fix transfer-buffer overflows
CVE-2021-47474comedi: vmk80xx: fix bulk-buffer overflow
CVE-2021-47473scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
CVE-2021-47471drm: mxsfb: Fix NULL pointer dereference crash on unload
CVE-2021-47470mm, slub: fix potential use-after-free in slab_debugfs_fops
CVE-2021-47468isdn: mISDN: Fix sleeping function called from invalid context
CVE-2021-47467kunit: fix reference count leak in kfree_at_end
CVE-2021-47466mm, slub: fix potential memoryleak in kmem_cache_open()

Showing top 20 of 63 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-47456

No comments yet


Leave a comment