CVE-2021-47301

medium

Description

In the Linux kernel, the following vulnerability has been resolved: igb: Fix use-after-free error during reset Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring. Failure to do so can cause invalid memory accesses. If igb_poll() runs while the controller is reset this can lead to the driver try to free a skb that was already freed. (The crash is harder to reproduce with the igb driver, but the same potential problem exists as the code is identical to igc)

References

https://git.kernel.org/stable/c/f153664d8e70c11d0371341613651e1130e20240

https://git.kernel.org/stable/c/d7367f781e5a9ca5df9082b15b272b55e76931f8

https://git.kernel.org/stable/c/d3ccb18ed5ac3283c7b31ecc685b499e580d5492

https://git.kernel.org/stable/c/8e24c12f2ff6d32fd9f057382f08e748ec97194c

https://git.kernel.org/stable/c/88e0720133d42d34851c8721cf5f289a50a8710f

https://git.kernel.org/stable/c/7b292608db23ccbbfbfa50cdb155d01725d7a52e

Details

Source: Mitre, NVD

Published: 2024-05-21

Updated: 2024-05-21

Risk Information

CVSS v2

Base Score: 5.9

Vector: CVSS2#AV:L/AC:H/Au:M/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 6.4

Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Severity: Medium