Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2021-47521
HistoryMay 24, 2024 - 3:15 p.m.

CVE-2021-47521

2024-05-2415:15:14
CWE-416
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
3
linux kernel
use after free
sja1000 driver

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

can: sja1000: fix use after free in ems_pcmcia_add_card()

If the last channel is not available then “dev” is freed. Fortunately,
we can just use “pdev->irq” instead.

Also we should check if at least one channel was set up.

Affected configurations

Nvd
Node
linuxlinux_kernelRange3.24.4.295
OR
linuxlinux_kernelRange4.54.9.293
OR
linuxlinux_kernelRange4.104.14.258
OR
linuxlinux_kernelRange4.154.19.221
OR
linuxlinux_kernelRange4.205.4.165
OR
linuxlinux_kernelRange5.55.10.85
OR
linuxlinux_kernelRange5.115.15.8
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

5.1%