Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: can: sja1000: fix use after free in ems_pcmcia_add_card() If the last channel is not available then "dev" is freed. Fortunately, we can just use "pdev->irq" instead. Also we should check if at least one channel was set up.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.2, < 4.4.295 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6becPatch
- https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2aPatch
- https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45Patch
- https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039cePatch
- https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288Patch
- https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36Patch
- https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4Patch
- https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aaPatch
- https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6becPatch
- https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2aPatch
- https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45Patch
- https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039cePatch
- https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288Patch
- https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36Patch
- https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4Patch
FAQ
What is CVE-2021-47521?
CVE-2021-47521 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: can: sja1000: fix use after free in ems_pcmcia_add_card() If the last channel is not available then "dev" is freed. Fortunately, ...
How severe is CVE-2021-47521?
CVE-2021-47521 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47521?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.