In the Linux kernel, the following vulnerability has been resolved:
igb: Fix use-after-free error during reset
Cleans the next descriptor to watch (next_to_watch) when cleaning the
TX ring.
Failure to do so can cause invalid memory accesses. If igb_poll() runs
while the controller is reset this can lead to the driver try to free
a skb that was already freed.
(The crash is harder to reproduce with the igb driver, but the same
potential problem exists as the code is identical to igc)
References
Configurations
Configuration 1 (hide)
|
History
26 Dec 2024, 20:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/7b292608db23ccbbfbfa50cdb155d01725d7a52e - Patch | |
References | () https://git.kernel.org/stable/c/88e0720133d42d34851c8721cf5f289a50a8710f - Patch | |
References | () https://git.kernel.org/stable/c/8e24c12f2ff6d32fd9f057382f08e748ec97194c - Patch | |
References | () https://git.kernel.org/stable/c/d3ccb18ed5ac3283c7b31ecc685b499e580d5492 - Patch | |
References | () https://git.kernel.org/stable/c/d7367f781e5a9ca5df9082b15b272b55e76931f8 - Patch | |
References | () https://git.kernel.org/stable/c/f153664d8e70c11d0371341613651e1130e20240 - Patch | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
Information
Published : 2024-05-21 15:15
Updated : 2024-12-26 20:44
NVD link : CVE-2021-47301
Mitre link : CVE-2021-47301
CVE.ORG link : CVE-2021-47301
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free