In the Linux kernel, the following vulnerability has been resolved: net:
ll_temac: Make sure to free skb when it is completely used With the skb
pointer piggy-backed on the TX BD, we have a simple and efficient way to
free the skb buffer when the frame has been transmitted. But in order to
avoid freeing the skb while there are still fragments from the skb in use,
we need to piggy-back on the TX BD of the skb, not the first. Without this,
we are doing use-after-free on the DMA side, when the first BD of a multi
TX BD packet is seen as completed in xmit_done, and the remaining BDs are
still being processed.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/6aa32217a9a446275440ee8724b1ecaf1838df47 (5.13-rc7)
git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b
launchpad.net/bugs/cve/CVE-2021-47224
nvd.nist.gov/vuln/detail/CVE-2021-47224
security-tracker.debian.org/tracker/CVE-2021-47224
www.cve.org/CVERecord?id=CVE-2021-47224