Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rmqp-6x5x-g7fg

Опубликовано: 21 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

In the Linux kernel, the following vulnerability has been resolved:

can: j1939: fix Use-after-Free, hold skb ref while in use

This patch fixes a Use-after-Free found by the syzbot.

The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

In the Linux kernel, the following vulnerability has been resolved:

can: j1939: fix Use-after-Free, hold skb ref while in use

This patch fixes a Use-after-Free found by the syzbot.

The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

EPSS

Процентиль: 5%
0.00022
Низкий

8.4 High

CVSS3

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 8.4
ubuntu
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 5.5
redhat
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
nvd
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
debian
больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: c ...

CVSS3: 8.4
fstec
больше 4 лет назад

Уязвимость функции j1939_session_skb_drop_old() модуля net/can/j1939/transport.c поддержки сокетов j1939 шины CAN ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 5%
0.00022
Низкий

8.4 High

CVSS3

Дефекты

CWE-416