In the Linux kernel, the following vulnerability has been resolved:
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..).
If some error happens in emac_tx_fill_tpd(), the skb will be freed via
dev_kfree_skb(skb) in error branch of emac_tx_fill_tpd().
But the freed skb is still used via skb->len by netdev_sent_queue(,skb->len).
As i observed that emac_tx_fill_tpd() haven't modified the value of skb->len,
thus my patch assigns skb->len to 'len' before the possible free and
use 'len' instead of skb->len later.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-28T08:13:30.905Z
Updated: 2024-11-04T11:57:43.263Z
Reserved: 2024-02-27T18:42:55.953Z
Link: CVE-2021-47013
Vulnrichment
Updated: 2024-08-04T05:24:39.713Z
NVD
Status : Awaiting Analysis
Published: 2024-02-28T09:15:38.800
Modified: 2024-11-21T06:35:11.433
Link: CVE-2021-47013
Redhat