| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_pci: peak_pci_remove(): fix UAF\n\nWhen remove the module peek_pci, referencing 'chan' again after\nreleasing 'dev' will cause UAF.\n\nFix this by releasing 'dev' later.\n\nThe following log reveals it:\n\n[ 35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537\n[ 35.965513 ] Call Trace:\n[ 35.965718 ] dump_stack_lvl+0xa8/0xd1\n[ 35.966028 ] print_address_description+0x87/0x3b0\n[ 35.966420 ] kasan_report+0x172/0x1c0\n[ 35.966725 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967137 ] ? trace_irq_enable_rcuidle+0x10/0x170\n[ 35.967529 ] ? peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.967945 ] __asan_report_load8_noabort+0x14/0x20\n[ 35.968346 ] peak_pci_remove+0x16f/0x270 [peak_pci]\n[ 35.968752 ] pci_device_remove+0xa9/0x250" |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/net/can/sja1000/peak_pci.c" |
| ], |
| "versions": [ |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "1c616528ba4aeb1125a06b407572ab7b56acae38", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "447d44cd2f67a20b596ede3ca3cd67086dfd9ca9", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "34914971bb3244db4ce2be44e9438a9b30c56250", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "adbda14730aacce41c0d3596415aa39ad63eafd9", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "1248582e47a9f7ce0ecd156c39fc61f8b6aa3699", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "28f28e4bc3a5e0051faa963f10b778ab38c1db69", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "0e5afdc2315b0737edcf55bede4ee1640d2d464d", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd", |
| "lessThan": "949fe9b35570361bc6ee2652f89a0561b26eec98", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/net/can/sja1000/peak_pci.c" |
| ], |
| "versions": [ |
| { |
| "version": "3.4", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "3.4", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.4.290", |
| "lessThanOrEqual": "4.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.9.288", |
| "lessThanOrEqual": "4.9.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.14.253", |
| "lessThanOrEqual": "4.14.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "4.19.214", |
| "lessThanOrEqual": "4.19.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.4.156", |
| "lessThanOrEqual": "5.4.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.76", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.14.15", |
| "lessThanOrEqual": "5.14.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "4.4.290" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "4.9.288" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "4.14.253" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "4.19.214" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "5.4.156" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "5.10.76" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "5.14.15" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "3.4", |
| "versionEndExcluding": "5.15" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/1c616528ba4aeb1125a06b407572ab7b56acae38" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/adbda14730aacce41c0d3596415aa39ad63eafd9" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/28f28e4bc3a5e0051faa963f10b778ab38c1db69" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/949fe9b35570361bc6ee2652f89a0561b26eec98" |
| } |
| ], |
| "title": "can: peak_pci: peak_pci_remove(): fix UAF", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2021-47456", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |