Bug 1224855 (CVE-2021-47224) - VUL-0: CVE-2021-47224: kernel: net: ll_temac: Make sure to free skb when it is completely used
Summary: VUL-0: CVE-2021-47224: kernel: net: ll_temac: Make sure to free skb when it i...
Status: NEW
Alias: CVE-2021-47224
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/406850/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-47224:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-22 08:10 UTC by SMASH SMASH
Modified: 2024-05-24 12:30 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-22 08:10:20 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: ll_temac: Make sure to free skb when it is completely used

With the skb pointer piggy-backed on the TX BD, we have a simple and
efficient way to free the skb buffer when the frame has been transmitted.
But in order to avoid freeing the skb while there are still fragments from
the skb in use, we need to piggy-back on the TX BD of the skb, not the
first.

Without this, we are doing use-after-free on the DMA side, when the first
BD of a multi TX BD packet is seen as completed in xmit_done, and the
remaining BDs are still being processed.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-47224
https://www.cve.org/CVERecord?id=CVE-2021-47224
https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2021/CVE-2021-47224.mbox
Comment 2 Michal Hocko 2024-05-24 12:30:37 UTC
nothing to be done