In the Linux kernel, the following vulnerability has been resolved: igb:
Fix use-after-free error during reset Cleans the next descriptor to watch
(next_to_watch) when cleaning the TX ring. Failure to do so can cause
invalid memory accesses. If igb_poll() runs while the controller is reset
this can lead to the driver try to free a skb that was already freed. (The
crash is harder to reproduce with the igb driver, but the same potential
problem exists as the code is identical to igc)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-4.15 | < any | UNKNOWN |
git.kernel.org/linus/7b292608db23ccbbfbfa50cdb155d01725d7a52e (5.14-rc2)
git.kernel.org/stable/c/7b292608db23ccbbfbfa50cdb155d01725d7a52e
git.kernel.org/stable/c/88e0720133d42d34851c8721cf5f289a50a8710f
git.kernel.org/stable/c/8e24c12f2ff6d32fd9f057382f08e748ec97194c
git.kernel.org/stable/c/d3ccb18ed5ac3283c7b31ecc685b499e580d5492
git.kernel.org/stable/c/d7367f781e5a9ca5df9082b15b272b55e76931f8
git.kernel.org/stable/c/f153664d8e70c11d0371341613651e1130e20240
launchpad.net/bugs/cve/CVE-2021-47301
nvd.nist.gov/vuln/detail/CVE-2021-47301
security-tracker.debian.org/tracker/CVE-2021-47301
www.cve.org/CVERecord?id=CVE-2021-47301