CVE-2021-47224

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
21/05/2024
Last modified:
04/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: ll_temac: Make sure to free skb when it is completely used<br /> <br /> With the skb pointer piggy-backed on the TX BD, we have a simple and<br /> efficient way to free the skb buffer when the frame has been transmitted.<br /> But in order to avoid freeing the skb while there are still fragments from<br /> the skb in use, we need to piggy-back on the TX BD of the skb, not the<br /> first.<br /> <br /> Without this, we are doing use-after-free on the DMA side, when the first<br /> BD of a multi TX BD packet is seen as completed in xmit_done, and the<br /> remaining BDs are still being processed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.128 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.46 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.12.13 (excluding)
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*