SB2024060819 - Stack-based buffer overflow in Linux kernel core en driver
Published: June 8, 2024 Updated: May 13, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2021-46931)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to stack overflow within the mlx5e_tx_reporter_dump_sq() and mlx5e_reporter_tx_timeout() functions in drivers/net/ethernet/mellanox/mlx5/core/en/reporter_tx.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/73665165b64a8f3c5b3534009a69be55bb744f05
- https://git.kernel.org/stable/c/07f13d58a8ecc3baf9a488588fb38c5cb0db484f
- https://git.kernel.org/stable/c/918fc3855a6507a200e9cf22c20be852c0982687
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.90
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16