CVE-2021-46998

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
28/02/2024
Last modified:
06/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ethernet:enic: Fix a use after free bug in enic_hard_start_xmit<br /> <br /> In enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside<br /> enic_queue_wq_skb, if some error happens, the skb will be freed<br /> by dev_kfree_skb(skb). But the freed skb is still used in<br /> skb_tx_timestamp(skb).<br /> <br /> My patch makes enic_queue_wq_skb() return error and goto spin_unlock()<br /> incase of error. The solution is provided by Govind.<br /> See https://lkml.org/lkml/2021/4/30/961.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.16 (including) 4.19.191 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.120 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.38 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.11.22 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.12.5 (excluding)