• 公告ID (KylinSec-SA-2024-2846)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

can: j1939: fix Use-after-Free, hold skb ref while in use

This patch fixes a Use-after-Free found by the syzbot.

The problem is that a skb is taken from the per-session skb queue,
without incrementing the ref count. This leads to a Use-after-Free if
the skb is taken concurrently from the session queue due to a CTS.

安全等级: Low

公告ID: KylinSec-SA-2024-2846

发布日期: 2024年6月20日

关联CVE: CVE-2021-47232  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

can: j1939: fix Use-after-Free, hold skb ref while in use

This patch fixes a Use-after-Free found by the syzbot.

The problem is that a skb is taken from the per-session skb queue,
without incrementing the ref count. This leads to a Use-after-Free if
the skb is taken concurrently from the session queue due to a CTS.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-47232 KY3.5.2 kernel Unaffected
CVE-2021-47232 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-2845 下一篇:KylinSec-SA-2024-4630