CVE-2021-47224
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/05/2024
Last modified:
04/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: ll_temac: Make sure to free skb when it is completely used<br />
<br />
With the skb pointer piggy-backed on the TX BD, we have a simple and<br />
efficient way to free the skb buffer when the frame has been transmitted.<br />
But in order to avoid freeing the skb while there are still fragments from<br />
the skb in use, we need to piggy-back on the TX BD of the skb, not the<br />
first.<br />
<br />
Without this, we are doing use-after-free on the DMA side, when the first<br />
BD of a multi TX BD packet is seen as completed in xmit_done, and the<br />
remaining BDs are still being processed.
Impact
Base Score 3.x
6.20
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.128 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.46 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.12.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
- https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
- https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
- https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b
- https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
- https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
- https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
- https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b



