Vulnerability Details : CVE-2021-46998
In the Linux kernel, the following vulnerability has been resolved:
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
In enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside
enic_queue_wq_skb, if some error happens, the skb will be freed
by dev_kfree_skb(skb). But the freed skb is still used in
skb_tx_timestamp(skb).
My patch makes enic_queue_wq_skb() return error and goto spin_unlock()
incase of error. The solution is provided by Govind.
See https://lkml.org/lkml/2021/4/30/961.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-46998
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-46998
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-46998
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-12-06 |
CWE ids for CVE-2021-46998
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-46998
-
https://git.kernel.org/stable/c/f7f6f07774091a6ddd98500b85386c3c6afb30d3
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/d90529392aaf498dafa95d212295d64b2cea4e24
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/7afdd6aba95c8a526038e7abe283eeac3e4320f1
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/6892396ebf04ea2c021d80e10f4075e014cd7cc3
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/25a87b1f566b5eb2af2857a928f0e2310d900976
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/643001b47adc844ae33510c4bb93c236667008a3
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to