Stack-based buffer overflow in Linux kernel - CVE-2021-46931
Published: June 8, 2024 / Updated: May 13, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to stack overflow within the mlx5e_tx_reporter_dump_sq() and mlx5e_reporter_tx_timeout() functions in drivers/net/ethernet/mellanox/mlx5/core/en/reporter_tx.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/73665165b64a8f3c5b3534009a69be55bb744f05
- https://git.kernel.org/stable/c/07f13d58a8ecc3baf9a488588fb38c5cb0db484f
- https://git.kernel.org/stable/c/918fc3855a6507a200e9cf22c20be852c0982687
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.90
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16