In the Linux kernel, the following vulnerability has been resolved:
igb: Fix use-after-free error during reset
Cleans the next descriptor to watch (next_to_watch) when cleaning the
TX ring.
Failure to do so can cause invalid memory accesses. If igb_poll() runs
while the controller is reset this can lead to the driver try to free
a skb that was already freed.
(The crash is harder to reproduce with the igb driver, but the same
potential problem exists as the code is identical to igc)
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T14:35:22.705Z
Updated: 2024-11-04T12:03:17.182Z
Reserved: 2024-05-21T13:27:52.132Z
Link: CVE-2021-47301
Vulnrichment
Updated: 2024-08-04T05:32:08.341Z
NVD
Status : Awaiting Analysis
Published: 2024-05-21T15:15:17.890
Modified: 2024-05-21T16:54:26.047
Link: CVE-2021-47301
Redhat