Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2021-47013
HistoryFeb 28, 2024 - 9:15 a.m.

CVE-2021-47013

2024-02-2809:15:38
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
2
linux kernel
use after free
vulnerability
emac_mac_tx_buf_send

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%

In the Linux kernel, the following vulnerability has been resolved:

net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send

In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(…,skb,…).
If some error happens in emac_tx_fill_tpd(), the skb will be freed via
dev_kfree_skb(skb) in error branch of emac_tx_fill_tpd().
But the freed skb is still used via skb->len by netdev_sent_queue(,skb->len).

As i observed that emac_tx_fill_tpd() haven’t modified the value of skb->len,
thus my patch assigns skb->len to ‘len’ before the possible free and
use ‘len’ instead of skb->len later.

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%