aboutsummaryrefslogtreecommitdiffstats
path: root/cve/published/2021/CVE-2021-46998.json
blob: 4a9fcc0ea9053f80a55e29a19b650cf8b770f878 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
{
   "containers": {
      "cna": {
         "providerMetadata": {
            "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
         },
         "descriptions": [
            {
               "lang": "en",
               "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nethernet:enic: Fix a use after free bug in enic_hard_start_xmit\n\nIn enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside\nenic_queue_wq_skb, if some error happens, the skb will be freed\nby dev_kfree_skb(skb). But the freed skb is still used in\nskb_tx_timestamp(skb).\n\nMy patch makes enic_queue_wq_skb() return error and goto spin_unlock()\nincase of error. The solution is provided by Govind.\nSee https://lkml.org/lkml/2021/4/30/961."
            }
         ],
         "affected": [
            {
               "product": "Linux",
               "vendor": "Linux",
               "defaultStatus": "unaffected",
               "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               "versions": [
                  {
                     "version": "fb7516d42478e",
                     "lessThan": "25a87b1f566b",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "fb7516d42478e",
                     "lessThan": "f7f6f0777409",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "fb7516d42478e",
                     "lessThan": "7afdd6aba95c",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "fb7516d42478e",
                     "lessThan": "6892396ebf04",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "fb7516d42478e",
                     "lessThan": "d90529392aaf",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "fb7516d42478e",
                     "lessThan": "643001b47adc",
                     "status": "affected",
                     "versionType": "git"
                  }
               ]
            },
            {
               "product": "Linux",
               "vendor": "Linux",
               "defaultStatus": "affected",
               "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               "versions": [
                  {
                     "version": "4.16",
                     "status": "affected"
                  },
                  {
                     "version": "0",
                     "lessThan": "4.16",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "4.19.191",
                     "lessThanOrEqual": "4.19.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "5.4.120",
                     "lessThanOrEqual": "5.4.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "5.10.38",
                     "lessThanOrEqual": "5.10.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "5.11.22",
                     "lessThanOrEqual": "5.11.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "5.12.5",
                     "lessThanOrEqual": "5.12.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "5.13",
                     "lessThanOrEqual": "*",
                     "status": "unaffected",
                     "versionType": "original_commit_for_fix"
                  }
               ]
            }
         ],
         "references": [
            {
               "url": "https://git.kernel.org/stable/c/25a87b1f566b5eb2af2857a928f0e2310d900976"
            },
            {
               "url": "https://git.kernel.org/stable/c/f7f6f07774091a6ddd98500b85386c3c6afb30d3"
            },
            {
               "url": "https://git.kernel.org/stable/c/7afdd6aba95c8a526038e7abe283eeac3e4320f1"
            },
            {
               "url": "https://git.kernel.org/stable/c/6892396ebf04ea2c021d80e10f4075e014cd7cc3"
            },
            {
               "url": "https://git.kernel.org/stable/c/d90529392aaf498dafa95d212295d64b2cea4e24"
            },
            {
               "url": "https://git.kernel.org/stable/c/643001b47adc844ae33510c4bb93c236667008a3"
            }
         ],
         "title": "ethernet:enic: Fix a use after free bug in enic_hard_start_xmit",
         "x_generator": {
            "engine": "bippy-c298863b1525"
         }
      }
   },
   "cveMetadata": {
      "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
      "cveID": "CVE-2021-46998",
      "requesterUserId": "gregkh@kernel.org",
      "serial": "1",
      "state": "PUBLISHED"
   },
   "dataType": "CVE_RECORD",
   "dataVersion": "5.0"
}