Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2021-46998
HistoryFeb 28, 2024 - 9:15 a.m.

CVE-2021-46998

2024-02-2809:15:38
Debian Security Bug Tracker
security-tracker.debian.org
6
linux kernel
enic_hard_start_xmit
vulnerability fix
govind
cve-2021-46998
skb_tx_timestamp

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.3%

In the Linux kernel, the following vulnerability has been resolved: ethernet:enic: Fix a use after free bug in enic_hard_start_xmit In enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside enic_queue_wq_skb, if some error happens, the skb will be freed by dev_kfree_skb(skb). But the freed skb is still used in skb_tx_timestamp(skb). My patch makes enic_queue_wq_skb() return error and goto spin_unlock() incase of error. The solution is provided by Govind. See https://lkml.org/lkml/2021/4/30/961.

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.3%