In the Linux kernel, the following vulnerability has been resolved:
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
It will trigger UAF for rx_kref of j1939_priv as following.
cpu0 cpu1
j1939_sk_bind(socket0, ndev0, ...)
j1939_netdev_start
j1939_sk_bind(socket1, ndev0, ...)
j1939_netdev_start
j1939_priv_set
j1939_priv_get_by_ndev_locked
j1939_jsk_add
.....
j1939_netdev_stop
kref_put_lock(&priv->rx_kref, ...)
kref_get(&priv->rx_kref, ...)
REFCOUNT_WARN("addition on 0;...")
====================================================
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0
RIP: 0010:refcount_warn_saturate+0x169/0x1e0
Call Trace:
j1939_netdev_start+0x68b/0x920
j1939_sk_bind+0x426/0xeb0
? security_socket_bind+0x83/0xb0
The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to
protect.
References
Configurations
Configuration 1 (hide)
|
History
14 Jan 2025, 17:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/6e8811707e2df0c6ba920f0cad3a3bca7b42132f - Patch | |
References | () https://git.kernel.org/stable/c/864e77771a24c877aaf53aee019f78619cbcd668 - Patch | |
References | () https://git.kernel.org/stable/c/a0e47d2833b4f65e6c799f28c6b636d36b8b936d - Patch | |
References | () https://git.kernel.org/stable/c/d9d52a3ebd284882f5562c88e55991add5d01586 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
21 Nov 2024, 06:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/6e8811707e2df0c6ba920f0cad3a3bca7b42132f - | |
References | () https://git.kernel.org/stable/c/864e77771a24c877aaf53aee019f78619cbcd668 - | |
References | () https://git.kernel.org/stable/c/a0e47d2833b4f65e6c799f28c6b636d36b8b936d - | |
References | () https://git.kernel.org/stable/c/d9d52a3ebd284882f5562c88e55991add5d01586 - |
22 May 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-22 07:15
Updated : 2025-01-14 17:32
NVD link : CVE-2021-47459
Mitre link : CVE-2021-47459
CVE.ORG link : CVE-2021-47459
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free