CVE-2021-47013

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
28/02/2024
Last modified:
09/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send<br /> <br /> In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..).<br /> If some error happens in emac_tx_fill_tpd(), the skb will be freed via<br /> dev_kfree_skb(skb) in error branch of emac_tx_fill_tpd().<br /> But the freed skb is still used via skb-&gt;len by netdev_sent_queue(,skb-&gt;len).<br /> <br /> As i observed that emac_tx_fill_tpd() haven&amp;#39;t modified the value of skb-&gt;len,<br /> thus my patch assigns skb-&gt;len to &amp;#39;len&amp;#39; before the possible free and<br /> use &amp;#39;len&amp;#39; instead of skb-&gt;len later.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.9 (including) 4.9.269 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.233 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.191 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.119 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.37 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.11.21 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.12.4 (excluding)