{"id":"CVE-2021-47669","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: vxcan: vxcan_xmit: fix use after free bug\n\nAfter calling netif_rx_ni(skb), dereferencing skb is unsafe.\nEspecially, the canfd_frame cfd which aliases skb memory is accessed\nafter the netif_rx_ni().","modified":"2026-03-23T05:00:37.231022Z","published":"2025-04-17T18:15:43.730Z","related":["SUSE-SU-2025:01600-1","SUSE-SU-2025:01633-1","SUSE-SU-2025:1574-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/6d6dcf2399cdd26f7f5426ca8dd8366b7f2ca105"},{"type":"FIX","url":"https://git.kernel.org/stable/c/75854cad5d80976f6ea0f0431f8cedd3bcc475cb"},{"type":"FIX","url":"https://git.kernel.org/stable/c/9b820875a32a3443d67bfd368e93038354e98052"},{"type":"FIX","url":"https://git.kernel.org/stable/c/a24476b37167816e6352ca1a2cf3769847774f70"},{"type":"FIX","url":"https://git.kernel.org/stable/c/e771a874076115df8bff27d325edfd2340e4ec69"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47669.json","unresolved_ranges":[{"events":[{"introduced":"4.12"},{"fixed":"4.14.218"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.171"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.93"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.11"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}