In the Linux kernel, the following vulnerability has been resolved:
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..).
If some error happens in emac_tx_fill_tpd(), the skb will be freed via
dev_kfree_skb(skb) in error branch of emac_tx_fill_tpd().
But the freed skb is still used via skb->len by netdev_sent_queue(,skb->len).
As i observed that emac_tx_fill_tpd() haven't modified the value of skb->len,
thus my patch assigns skb->len to 'len' before the possible free and
use 'len' instead of skb->len later.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-28 09:15
Updated : 2024-12-09 17:59
NVD link : CVE-2021-47013
Mitre link : CVE-2021-47013
CVE.ORG link : CVE-2021-47013
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
