CVE-2021-47301

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
21/05/2024
Last modified:
26/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> igb: Fix use-after-free error during reset<br /> <br /> Cleans the next descriptor to watch (next_to_watch) when cleaning the<br /> TX ring.<br /> <br /> Failure to do so can cause invalid memory accesses. If igb_poll() runs<br /> while the controller is reset this can lead to the driver try to free<br /> a skb that was already freed.<br /> <br /> (The crash is harder to reproduce with the igb driver, but the same<br /> potential problem exists as the code is identical to igc)

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.12 (including) 4.14.241 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.199 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.136 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.54 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.13.6 (excluding)
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*