First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: ll_temac: Make sure to free skb when it is completely used With the skb pointer piggy-backed on the TX BD, we have a simple and efficient way to free the skb buffer when the frame has been transmitted. But in order to avoid freeing the skb while there are still fragments from the skb in use, we need to piggy-back on the TX BD of the skb, not the first. Without this, we are doing use-after-free on the DMA side, when the first BD of a multi TX BD packet is seen as completed in xmit_done, and the remaining BDs are still being processed.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | <5.4.128 | |
Linux Kernel | >=5.5<5.10.46 | |
Linux Kernel | >=5.11<5.12.13 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 | |
Linux Kernel | =5.13-rc3 | |
Linux Kernel | =5.13-rc4 | |
Linux Kernel | =5.13-rc5 | |
Linux Kernel | =5.13-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47224 has a CVSS score that reflects a medium severity vulnerability in the Linux kernel.
To fix CVE-2021-47224, update your Linux kernel to the latest patched version provided by your distribution.
Exploiting CVE-2021-47224 could lead to resource leaks, potentially affecting system performance and stability.
CVE-2021-47224 affects specific versions of the Linux kernel prior to the patch release that addresses this vulnerability.
To determine if your system is vulnerable to CVE-2021-47224, check the version of the Linux kernel you are currently using against the patched releases.