CVE-2021-47670
can: peak_usb: fix use after free bugs
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix use after free bugs After calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe. Especially, the can_frame cf which aliases skb memory is accessed after the peak_usb_netif_rx_ni(). Reordering the lines solves the issue.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 17, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new high vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
0a25e1f4f18566b750ebd3ae995af64e23111e63 < 5408824636fa0dfedb9ecb0d94abd573131bfbbe 0a25e1f4f18566b750ebd3ae995af64e23111e63 < ddd1416f44130377798c1430b76503513b7497c2 0a25e1f4f18566b750ebd3ae995af64e23111e63 < ec939c13c3fff2114479769c8380b7f1a54feca9 0a25e1f4f18566b750ebd3ae995af64e23111e63 < 50aca891d7a554db0901b245167cd653d73aaa71
Linux / Linux
4.0
References
git.kernel.org: https://git.kernel.org/stable/c/5408824636fa0dfedb9ecb0d94abd573131bfbbe git.kernel.org: https://git.kernel.org/stable/c/ddd1416f44130377798c1430b76503513b7497c2 git.kernel.org: https://git.kernel.org/stable/c/ec939c13c3fff2114479769c8380b7f1a54feca9 git.kernel.org: https://git.kernel.org/stable/c/50aca891d7a554db0901b245167cd653d73aaa71