Executive Summary

Informations
Name CVE-2021-46913 First vendor Publication 2024-02-27
Vendor Cve Last vendor Modification 2024-04-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: clone set element expression template

memcpy() breaks when using connlimit in set elements. Use nft_expr_clone() to initialize the connlimit expression list, otherwise connlimit garbage collector crashes when walking on the list head copy.

[ 493.064656] Workqueue: events_power_efficient nft_rhash_gc [nf_tables] [ 493.064685] RIP: 0010:find_or_evict+0x5a/0x90 [nf_conncount] [ 493.064694] Code: 2b 43 40 83 f8 01 77 0d 48 c7 c0 f5 ff ff ff 44 39 63 3c 75 df 83 6d 18 01 48 8b 43 08 48 89 de 48 8b 13 48 8b 3d ee 2f 00 00 <48> 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 03 48 83 [ 493.064699] RSP: 0018:ffffc90000417dc0 EFLAGS: 00010297 [ 493.064704] RAX: 0000000000000000 RBX: ffff888134f38410 RCX: 0000000000000000 [ 493.064708] RDX: 0000000000000000 RSI: ffff888134f38410 RDI: ffff888100060cc0 [ 493.064711] RBP: ffff88812ce594a8 R08: ffff888134f38438 R09: 00000000ebb9025c [ 493.064714] R10: ffffffff8219f838 R11: 0000000000000017 R12: 0000000000000001 [ 493.064718] R13: ffffffff82146740 R14: ffff888134f38410 R15: 0000000000000000 [ 493.064721] FS: 0000000000000000(0000) GS:ffff88840e440000(0000) knlGS:0000000000000000 [ 493.064725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 493.064729] CR2: 0000000000000008 CR3: 00000001330aa002 CR4: 00000000001706e0 [ 493.064733] Call Trace: [ 493.064737] nf_conncount_gc_list+0x8f/0x150 [nf_conncount] [ 493.064746] nft_rhash_gc+0x106/0x390 [nf_tables]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46913

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 3436

Sources (Detail)

https://git.kernel.org/stable/c/47d8de3c226574a3ddb8b87d0c152028d1bafef4
https://git.kernel.org/stable/c/4d8f9065830e526c83199186c5f56a6514f457d2
https://git.kernel.org/stable/c/e51ff3ffc316377cca21de8b80404eed0c37b3c3
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Date Informations
2024-11-21 21:24:29
  • Multiple Updates
2024-11-14 02:31:27
  • Multiple Updates
2024-11-09 02:32:12
  • Multiple Updates
2024-10-26 02:30:11
  • Multiple Updates
2024-10-25 02:31:52
  • Multiple Updates
2024-10-23 02:31:17
  • Multiple Updates
2024-10-03 02:27:48
  • Multiple Updates
2024-10-02 02:26:14
  • Multiple Updates
2024-09-04 02:25:46
  • Multiple Updates
2024-08-22 02:24:16
  • Multiple Updates
2024-08-02 13:30:38
  • Multiple Updates
2024-08-02 01:27:12
  • Multiple Updates
2024-04-10 17:27:42
  • Multiple Updates
2024-02-28 02:45:25
  • Multiple Updates
2024-02-28 02:24:14
  • Multiple Updates
2024-02-27 17:27:29
  • Multiple Updates
2024-02-27 13:18:31
  • First insertion