In the Linux kernel, the following vulnerability has been resolved: igb: Fix use-after-free error during reset Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring. Failure to do so can cause invalid memory accesses. If igb_poll() runs while the controller is reset this can lead to the driver try to free a skb that was already freed. (The crash is harder to reproduce with the igb driver, but the same potential problem exists as the code is identical to igc)
https://git.kernel.org/stable/c/f153664d8e70c11d0371341613651e1130e20240
https://git.kernel.org/stable/c/d7367f781e5a9ca5df9082b15b272b55e76931f8
https://git.kernel.org/stable/c/d3ccb18ed5ac3283c7b31ecc685b499e580d5492
https://git.kernel.org/stable/c/8e24c12f2ff6d32fd9f057382f08e748ec97194c
https://git.kernel.org/stable/c/88e0720133d42d34851c8721cf5f289a50a8710f
https://git.kernel.org/stable/c/7b292608db23ccbbfbfa50cdb155d01725d7a52e