
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was found in ch_ktls in the Linux Kernel (CVE-2021-46911). This vulnerability occurs due to a missing synchronization lock in the kernel's TLS implementation, which may cause a denial of service while doing page cleanup (Red Hat Portal).
The vulnerability is caused by improper synchronization in the ch_ktls component of the Linux Kernel. The issue specifically relates to page cleanup operations where a missing lock can lead to kernel panic. The CVSS v3 base score is 4.4, with attack vector being Local, attack complexity Low, and privileges required High. The vulnerability primarily affects availability with no impact on confidentiality or integrity (Red Hat Portal).
The primary impact of this vulnerability is a potential denial of service condition in the Linux kernel. When exploited, it can cause a kernel panic during page cleanup operations, affecting system availability (Red Hat Portal).
The issue has been fixed in the Linux kernel through a patch that improves synchronization by taking the tx_ctx lock for the complete skb transmit, preventing page cleanup if ACK is received in the middle. The fix involves modifying the ch_ktls component to properly handle synchronization during TLS operations (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."