Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-46913— netfilter: nftables: clone set element expression template

EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-46913

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
netfilter: nftables: clone set element expression template
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nftables: clone set element expression template memcpy() breaks when using connlimit in set elements. Use nft_expr_clone() to initialize the connlimit expression list, otherwise connlimit garbage collector crashes when walking on the list head copy. [ 493.064656] Workqueue: events_power_efficient nft_rhash_gc [nf_tables] [ 493.064685] RIP: 0010:find_or_evict+0x5a/0x90 [nf_conncount] [ 493.064694] Code: 2b 43 40 83 f8 01 77 0d 48 c7 c0 f5 ff ff ff 44 39 63 3c 75 df 83 6d 18 01 48 8b 43 08 48 89 de 48 8b 13 48 8b 3d ee 2f 00 00 <48> 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 03 48 83 [ 493.064699] RSP: 0018:ffffc90000417dc0 EFLAGS: 00010297 [ 493.064704] RAX: 0000000000000000 RBX: ffff888134f38410 RCX: 0000000000000000 [ 493.064708] RDX: 0000000000000000 RSI: ffff888134f38410 RDI: ffff888100060cc0 [ 493.064711] RBP: ffff88812ce594a8 R08: ffff888134f38438 R09: 00000000ebb9025c [ 493.064714] R10: ffffffff8219f838 R11: 0000000000000017 R12: 0000000000000001 [ 493.064718] R13: ffffffff82146740 R14: ffff888134f38410 R15: 0000000000000000 [ 493.064721] FS: 0000000000000000(0000) GS:ffff88840e440000(0000) knlGS:0000000000000000 [ 493.064725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 493.064729] CR2: 0000000000000008 CR3: 00000001330aa002 CR4: 00000000001706e0 [ 493.064733] Call Trace: [ 493.064737] nf_conncount_gc_list+0x8f/0x150 [nf_conncount] [ 493.064746] nft_rhash_gc+0x106/0x390 [nf_tables]
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于在集合元素中使用 connlimit 时 memcpy() 会中断。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 4094445229760d0d31a4190dfe88fe815c9fc34e ~ e51ff3ffc316377cca21de8b80404eed0c37b3c3 -
LinuxLinux 5.7 -

II. Public POCs for CVE-2021-46913

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-46913

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-02-27 · 67 CVEs total

CVE-2021-46951tpm: efi: Use local variable for calculating final log size
CVE-2021-46971perf/core: Fix unconditional security_locked_down() call
CVE-2021-46970bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
CVE-2021-46969bus: mhi: core: Fix invalid error returning in mhi_queue
CVE-2021-46957riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
CVE-2021-46956virtiofs: fix memory leak in virtio_fs_probe()
CVE-2021-46955openvswitch: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46954net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46953ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
CVE-2021-46952NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
CVE-2021-46958btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
CVE-2021-46950md/raid1: properly indicate failure when ending a failed write request
CVE-2021-46949sfc: farch: fix TX queue lookup in TX flush done handling
CVE-2021-46948sfc: farch: fix TX queue lookup in TX event handling
CVE-2021-46947sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues
CVE-2021-46945ext4: always panic when errors=panic is specified
CVE-2021-46944media: staging/intel-ipu3: Fix memory leak in imu_fmt
CVE-2021-46943media: staging/intel-ipu3: Fix set_fmt error handling
CVE-2021-46942io_uring: fix shared sqpoll cancellation hangs
CVE-2021-46941usb: dwc3: core: Do core softreset when switch mode

Showing top 20 of 67 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-46913

No comments yet


Leave a comment