First published: Wed Feb 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ethernet:enic: Fix a use after free bug in enic_hard_start_xmit In enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside enic_queue_wq_skb, if some error happens, the skb will be freed by dev_kfree_skb(skb). But the freed skb is still used in skb_tx_timestamp(skb). My patch makes enic_queue_wq_skb() return error and goto spin_unlock() incase of error. The solution is provided by Govind. See https://lkml.org/lkml/2021/4/30/961.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.16<4.19.191 | |
Linux Kernel | >=4.20<5.4.120 | |
Linux Kernel | >=5.5<5.10.38 | |
Linux Kernel | >=5.11<5.11.22 | |
Linux Kernel | >=5.12<5.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46998 has been classified with medium severity due to its potential impact on system stability.
To fix CVE-2021-46998, upgrade your Linux kernel to a version that includes the patch for this vulnerability.
CVE-2021-46998 affects multiple versions of the Linux kernel ranging from 4.16 to 5.12.5.
CVE-2021-46998 is categorized as a use-after-free vulnerability in the Linux kernel's ethernet driver.
As of now, there are no public reports indicating that CVE-2021-46998 is being actively exploited in the wild.