Логотип exploitDog
bind:CVE-2021-47232
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-47232

Количество 6

Количество 6

ubuntu логотип

CVE-2021-47232

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
EPSS: Низкий
redhat логотип

CVE-2021-47232

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2021-47232

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
EPSS: Низкий
debian логотип

CVE-2021-47232

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: c ...

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-rmqp-6x5x-g7fg

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2025-07312

больше 4 лет назад

Уязвимость функции j1939_session_skb_drop_old() модуля net/can/j1939/transport.c поддержки сокетов j1939 шины CAN ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-47232

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2021-47232

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2021-47232

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
0%
Низкий
больше 1 года назад
debian логотип
CVE-2021-47232

In the Linux kernel, the following vulnerability has been resolved: c ...

CVSS3: 8.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-rmqp-6x5x-g7fg

In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.

CVSS3: 8.4
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-07312

Уязвимость функции j1939_session_skb_drop_old() модуля net/can/j1939/transport.c поддержки сокетов j1939 шины CAN ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.4
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу