摘要:
In the Linux kernel, the following vulnerability has been resolved:
igb: Fix use-after-free error during reset
Cleans the next descriptor to watch (next_to_watch) when cleaning the
TX ring.
Failure to do so can cause invalid memory accesses. If igb_poll() runs
while the controller is reset this can lead to the driver try to free
a skb that was already freed.
(The crash is harder to reproduce with the igb driver, but the same
potential problem exists as the code is identical to igc)
安全等级: Low
公告ID: KylinSec-SA-2024-4717
发布日期: 2024年6月20日
关联CVE: CVE-2021-47301
In the Linux kernel, the following vulnerability has been resolved:
igb: Fix use-after-free error during reset
Cleans the next descriptor to watch (next_to_watch) when cleaning the
TX ring.
Failure to do so can cause invalid memory accesses. If igb_poll() runs
while the controller is reset this can lead to the driver try to free
a skb that was already freed.
(The crash is harder to reproduce with the igb driver, but the same
potential problem exists as the code is identical to igc)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-47301 | KY3.5.2 | kernel | Unaffected |
CVE-2021-47301 | V6 | kernel | Unaffected |