{"id":"CVE-2021-47670","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: peak_usb: fix use after free bugs\n\nAfter calling peak_usb_netif_rx_ni(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is accessed\nafter the peak_usb_netif_rx_ni().\n\nReordering the lines solves the issue.","modified":"2026-03-23T05:08:35.418819Z","published":"2025-04-17T18:15:43.833Z","related":["ALSA-2025:13589","ALSA-2025:13590","SUSE-SU-2025:01633-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:1574-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/50aca891d7a554db0901b245167cd653d73aaa71"},{"type":"FIX","url":"https://git.kernel.org/stable/c/5408824636fa0dfedb9ecb0d94abd573131bfbbe"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ddd1416f44130377798c1430b76503513b7497c2"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ec939c13c3fff2114479769c8380b7f1a54feca9"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47670.json","unresolved_ranges":[{"events":[{"introduced":"4.0"},{"fixed":"4.19.171"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.93"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.11"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}