2024-05-21 16:03:24 +00:00
{
"id" : "CVE-2021-47236" ,
"sourceIdentifier" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ,
"published" : "2024-05-21T15:15:12.857" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T06:35:41.480" ,
2024-05-21 18:03:30 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-05-21 16:03:24 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cdc_eem: fix tx fixup skb leak\n\nwhen usbnet transmit a skb, eem fixup it in eem_tx_fixup(),\nif skb_copy_expand() failed, it return NULL,\nusbnet_start_xmit() will have no chance to free original skb.\n\nfix it by free orginal skb in eem_tx_fixup() first,\nthen check skb clone status, if failed, return NULL to usbnet."
2024-05-26 02:03:22 +00:00
} ,
{
"lang" : "es" ,
"value" : " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: cdc_eem: corrige la fuga de skb de reparaci\u00f3n de tx cuando usbnet transmite un skb, eem lo repara en eem_tx_fixup(), si skb_copy_expand() falla, devuelve NULL, usbnet_start_xmit() No tendr\u00e1 posibilidad de liberar el skb original. solucionelo primero con skb original gratuito en eem_tx_fixup(), luego verifique el estado del clon de skb, si falla, devuelva NULL a usbnet."
2024-05-21 16:03:24 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
} ,
{
"url" : "https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d" ,
"source" : "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2024-05-21 16:03:24 +00:00
}
]
}