In the Linux kernel, the following vulnerability has been resolved: ice: xsk: return xsk buffers back to pool when cleaning the ring Currently we only NULL the xdp_buff pointer in the internal SW ring but we never give it back to the xsk buffer pool. This means that buffers can be leaked out of the buff pool and never be used again. Add missing xsk_buff_free() call to the routine that is supposed to clean the entries that are left in the ring so that these buffers in the umem can be used by other sockets. Also, only go through the space that is actually left to be cleaned instead of a whole ring.
History

Mon, 04 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-03-04T18:15:14.355Z

Updated: 2024-11-04T11:59:30.273Z

Reserved: 2024-03-04T18:12:48.835Z

Link: CVE-2021-47105

cve-icon Vulnrichment

Updated: 2024-08-04T05:24:39.883Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-04T19:15:18.707

Modified: 2024-03-05T13:41:01.900

Link: CVE-2021-47105

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-04T00:00:00Z

Links: CVE-2021-47105 - Bugzilla