跳转到帖子

Ubuntu: (CVE-2021-47013): linux vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (CVE-2021-47013): linux vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
02/28/2024
Created
11/21/2024
Added
11/19/2024
Modified
02/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..). If some error happens in emac_tx_fill_tpd(), the skb will be freed via dev_kfree_skb(skb) in error branch of emac_tx_fill_tpd(). But the freed skb is still used via skb->len by netdev_sent_queue(,skb->len). As i observed that emac_tx_fill_tpd() haven't modified the value of skb->len, thus my patch assigns skb->len to 'len' before the possible free and use 'len' instead of skb->len later.

Solution(s)

  • ubuntu-upgrade-linux
  • ubuntu-upgrade-linux-aws
  • ubuntu-upgrade-linux-aws-5-4
  • ubuntu-upgrade-linux-aws-fips
  • ubuntu-upgrade-linux-aws-hwe
  • ubuntu-upgrade-linux-azure
  • ubuntu-upgrade-linux-azure-4-15
  • ubuntu-upgrade-linux-azure-5-4
  • ubuntu-upgrade-linux-azure-fips
  • ubuntu-upgrade-linux-bluefield
  • ubuntu-upgrade-linux-fips
  • ubuntu-upgrade-linux-gcp
  • ubuntu-upgrade-linux-gcp-4-15
  • ubuntu-upgrade-linux-gcp-5-4
  • ubuntu-upgrade-linux-gcp-fips
  • ubuntu-upgrade-linux-gkeop
  • ubuntu-upgrade-linux-hwe
  • ubuntu-upgrade-linux-hwe-5-4
  • ubuntu-upgrade-linux-kvm
  • ubuntu-upgrade-linux-oracle
  • ubuntu-upgrade-linux-oracle-5-4
  • ubuntu-upgrade-linux-raspi
  • ubuntu-upgrade-linux-raspi-5-4

References

  • https://attackerkb.com/topics/cve-2021-47013
  • CVE - 2021-47013
  • https://git.kernel.org/linus/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
  • https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
  • https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
  • https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
  • https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
  • https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
  • https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
  • https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
  • https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
  • https://www.cve.org/CVERecord?id=CVE-2021-47013
View more
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…