Use After Free Affecting kernel-ipaclones-internal package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-KERNELIPACLONESINTERNAL-7236733
- published 10 Jun 2024
- disclosed 21 May 2024
Introduced: 21 May 2024
CVE-2021-47301 Open this link in a new tabHow to fix?
There is no fixed version for Centos:8
kernel-ipaclones-internal
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-ipaclones-internal
package and not the kernel-ipaclones-internal
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
igb: Fix use-after-free error during reset
Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring.
Failure to do so can cause invalid memory accesses. If igb_poll() runs while the controller is reset this can lead to the driver try to free a skb that was already freed.
(The crash is harder to reproduce with the igb driver, but the same potential problem exists as the code is identical to igc)
References
- https://access.redhat.com/security/cve/CVE-2021-47301
- https://git.kernel.org/stable/c/7b292608db23ccbbfbfa50cdb155d01725d7a52e
- https://git.kernel.org/stable/c/88e0720133d42d34851c8721cf5f289a50a8710f
- https://git.kernel.org/stable/c/8e24c12f2ff6d32fd9f057382f08e748ec97194c
- https://git.kernel.org/stable/c/d3ccb18ed5ac3283c7b31ecc685b499e580d5492
- https://git.kernel.org/stable/c/d7367f781e5a9ca5df9082b15b272b55e76931f8
- https://git.kernel.org/stable/c/f153664d8e70c11d0371341613651e1130e20240