CVE-2021-47013

Updated: 2024-12-10 01:56:47.52743

Description:

In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..). If some error happens in emac_tx_fill_tpd(), the skb will be freed via dev_kfree_skb(skb) in error branch of emac_tx_fill_tpd(). But the freed skb is still used via skb->len by netdev_sent_queue(,skb->len). As i observed that emac_tx_fill_tpd() haven't modified the value of skb->len, thus my patch assigns skb->len to 'len' before the possible free and use 'len' instead of skb->len later.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Already Fixed 2024-08-30 12:23:12
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH Already Fixed 2024-08-30 12:23:13
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-08-21 03:46:55
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2024-08-21 03:46:54
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-08-21 03:46:54
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-08-21 03:46:55
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Already Fixed 2024-06-09 14:19:15
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-08-21 03:46:55
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2024-08-21 03:46:54
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Already Fixed 2024-12-10 11:55:33