SB20240610120 - Use of uninitialized resource in Linux kernel en rep driver
Published: June 10, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use of uninitialized resource (CVE-ID: CVE-2021-47136)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to use of uninitialized resource within the tcf_classify_ingress() function in net/sched/cls_api.c, within the mlx5e_tc_update_skb() function in drivers/net/ethernet/mellanox/mlx5/core/en_tc.c, within the mlx5e_rep_tc_update_skb() function in drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e
- https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18
- https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.42
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.9
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13