Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-46931— net/mlx5e: Wrap the tx reporter dump callback to extract the sq

EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-46931

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net/mlx5e: Wrap the tx reporter dump callback to extract the sq
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Wrap the tx reporter dump callback to extract the sq Function mlx5e_tx_reporter_dump_sq() casts its void * argument to struct mlx5e_txqsq *, but in TX-timeout-recovery flow the argument is actually of type struct mlx5e_tx_timeout_ctx *. mlx5_core 0000:08:00.1 enp8s0f1: TX timeout detected mlx5_core 0000:08:00.1 enp8s0f1: TX timeout on queue: 1, SQ: 0x11ec, CQ: 0x146d, SQ Cons: 0x0 SQ Prod: 0x1, usecs since last trans: 21565000 BUG: stack guard page was hit at 0000000093f1a2de (stack is 00000000b66ea0dc..000000004d932dae) kernel stack overflow (page fault): 0000 [#1] SMP NOPTI CPU: 5 PID: 95 Comm: kworker/u20:1 Tainted: G W OE 5.13.0_mlnx #1 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Workqueue: mlx5e mlx5e_tx_timeout_work [mlx5_core] RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180 [mlx5_core] Call Trace: mlx5e_tx_reporter_dump+0x43/0x1c0 [mlx5_core] devlink_health_do_dump.part.91+0x71/0xd0 devlink_health_report+0x157/0x1b0 mlx5e_reporter_tx_timeout+0xb9/0xf0 [mlx5_core] ? mlx5e_tx_reporter_err_cqe_recover+0x1d0/0x1d0 [mlx5_core] ? mlx5e_health_queue_dump+0xd0/0xd0 [mlx5_core] ? update_load_avg+0x19b/0x550 ? set_next_entity+0x72/0x80 ? pick_next_task_fair+0x227/0x340 ? finish_task_switch+0xa2/0x280 mlx5e_tx_timeout_work+0x83/0xb0 [mlx5_core] process_one_work+0x1de/0x3a0 worker_thread+0x2d/0x3c0 ? process_one_work+0x3a0/0x3a0 kthread+0x115/0x130 ? kthread_park+0x90/0x90 ret_from_fork+0x1f/0x30 --[ end trace 51ccabea504edaff ]--- RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180 PKRU: 55555554 Kernel panic - not syncing: Fatal exception Kernel Offset: disabled end Kernel panic - not syncing: Fatal exception To fix this bug add a wrapper for mlx5e_tx_reporter_dump_sq() which extracts the sq from struct mlx5e_tx_timeout_ctx and set it as the TX-timeout-recovery flow dump callback.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于函数 mlx5e_tx_reporter_dump_sq() 将其 void * 参数转换为 struct mlx5e_txqsq *,但在 TX-timeout-recovery 流程中,参数实际上是 struct mlx5e_tx_timeout_ctx * 类型。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 5f29458b77d51c104554575b73184c243930aa87 ~ 73665165b64a8f3c5b3534009a69be55bb744f05 -
LinuxLinux 5.7 -

II. Public POCs for CVE-2021-46931

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-46931

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-02-27 · 67 CVEs total

CVE-2021-46951tpm: efi: Use local variable for calculating final log size
CVE-2021-46971perf/core: Fix unconditional security_locked_down() call
CVE-2021-46970bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
CVE-2021-46969bus: mhi: core: Fix invalid error returning in mhi_queue
CVE-2021-46957riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
CVE-2021-46956virtiofs: fix memory leak in virtio_fs_probe()
CVE-2021-46955openvswitch: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46954net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
CVE-2021-46953ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
CVE-2021-46952NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
CVE-2021-46958btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
CVE-2021-46950md/raid1: properly indicate failure when ending a failed write request
CVE-2021-46949sfc: farch: fix TX queue lookup in TX flush done handling
CVE-2021-46948sfc: farch: fix TX queue lookup in TX event handling
CVE-2021-46947sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues
CVE-2021-46945ext4: always panic when errors=panic is specified
CVE-2021-46944media: staging/intel-ipu3: Fix memory leak in imu_fmt
CVE-2021-46943media: staging/intel-ipu3: Fix set_fmt error handling
CVE-2021-46942io_uring: fix shared sqpoll cancellation hangs
CVE-2021-46941usb: dwc3: core: Do core softreset when switch mode

Showing top 20 of 67 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-46931

No comments yet


Leave a comment