Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-47013
HistoryFeb 28, 2024 - 12:00 a.m.

CVE-2021-47013

2024-02-2800:00:00
ubuntu.com
ubuntu.com
5
linux kernel
use-after-free
emac-mac driver

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%

In the Linux kernel, the following vulnerability has been resolved:
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send In
emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(…,skb,…). If some error
happens in emac_tx_fill_tpd(), the skb will be freed via dev_kfree_skb(skb)
in error branch of emac_tx_fill_tpd(). But the freed skb is still used via
skb->len by netdev_sent_queue(,skb->len). As i observed that
emac_tx_fill_tpd() haven’t modified the value of skb->len, thus my patch
assigns skb->len to ‘len’ before the possible free and use ‘len’ instead of
skb->len later.

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.1%