Executive Summary

Informations
Name CVE-2021-47224 First vendor Publication 2024-05-21
Vendor Cve Last vendor Modification 2024-11-04

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: ll_temac: Make sure to free skb when it is completely used

With the skb pointer piggy-backed on the TX BD, we have a simple and efficient way to free the skb buffer when the frame has been transmitted. But in order to avoid freeing the skb while there are still fragments from the skb in use, we need to piggy-back on the TX BD of the skb, not the first.

Without this, we are doing use-after-free on the DMA side, when the first BD of a multi TX BD packet is seen as completed in xmit_done, and the remaining BDs are still being processed.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47224

Sources (Detail)

https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-11-05 00:27:55
  • Multiple Updates
2024-05-21 21:27:27
  • First insertion