CVE-2021-47136 (GCVE-0-2021-47136)
Vulnerability from cvelistv5
Published
2024-03-25 09:07
Modified
2024-12-19 07:35
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: net: zero-initialize tc skb extension on allocation Function skb_ext_add() doesn't initialize created skb extension with any value and leaves it up to the user. However, since extension of type TC_SKB_EXT originally contained only single value tc_skb_ext->chain its users used to just assign the chain value without setting whole extension memory to zero first. This assumption changed when TC_SKB_EXT extension was extended with additional fields but not all users were updated to initialize the new fields which leads to use of uninitialized memory afterwards. UBSAN log: [ 778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28 [ 778.301495] load of value 107 is not a valid value for type '_Bool' [ 778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2 [ 778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 [ 778.307901] Call Trace: [ 778.308680] <IRQ> [ 778.309358] dump_stack+0xbb/0x107 [ 778.310307] ubsan_epilogue+0x5/0x40 [ 778.311167] __ubsan_handle_load_invalid_value.cold+0x43/0x48 [ 778.312454] ? memset+0x20/0x40 [ 778.313230] ovs_flow_key_extract.cold+0xf/0x14 [openvswitch] [ 778.314532] ovs_vport_receive+0x19e/0x2e0 [openvswitch] [ 778.315749] ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch] [ 778.317188] ? create_prof_cpu_mask+0x20/0x20 [ 778.318220] ? arch_stack_walk+0x82/0xf0 [ 778.319153] ? secondary_startup_64_no_verify+0xb0/0xbb [ 778.320399] ? stack_trace_save+0x91/0xc0 [ 778.321362] ? stack_trace_consume_entry+0x160/0x160 [ 778.322517] ? lock_release+0x52e/0x760 [ 778.323444] netdev_frame_hook+0x323/0x610 [openvswitch] [ 778.324668] ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch] [ 778.325950] __netif_receive_skb_core+0x771/0x2db0 [ 778.327067] ? lock_downgrade+0x6e0/0x6f0 [ 778.328021] ? lock_acquire+0x565/0x720 [ 778.328940] ? generic_xdp_tx+0x4f0/0x4f0 [ 778.329902] ? inet_gro_receive+0x2a7/0x10a0 [ 778.330914] ? lock_downgrade+0x6f0/0x6f0 [ 778.331867] ? udp4_gro_receive+0x4c4/0x13e0 [ 778.332876] ? lock_release+0x52e/0x760 [ 778.333808] ? dev_gro_receive+0xcc8/0x2380 [ 778.334810] ? lock_downgrade+0x6f0/0x6f0 [ 778.335769] __netif_receive_skb_list_core+0x295/0x820 [ 778.336955] ? process_backlog+0x780/0x780 [ 778.337941] ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core] [ 778.339613] ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0 [ 778.341033] ? kvm_clock_get_cycles+0x14/0x20 [ 778.342072] netif_receive_skb_list_internal+0x5f5/0xcb0 [ 778.343288] ? __kasan_kmalloc+0x7a/0x90 [ 778.344234] ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core] [ 778.345676] ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core] [ 778.347140] ? __netif_receive_skb_list_core+0x820/0x820 [ 778.348351] ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core] [ 778.349688] ? napi_gro_flush+0x26c/0x3c0 [ 778.350641] napi_complete_done+0x188/0x6b0 [ 778.351627] mlx5e_napi_poll+0x373/0x1b80 [mlx5_core] [ 778.352853] __napi_poll+0x9f/0x510 [ 778.353704] ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core] [ 778.355158] net_rx_action+0x34c/0xa40 [ 778.356060] ? napi_threaded_poll+0x3d0/0x3d0 [ 778.357083] ? sched_clock_cpu+0x18/0x190 [ 778.358041] ? __common_interrupt+0x8e/0x1a0 [ 778.359045] __do_softirq+0x1ce/0x984 [ 778.359938] __irq_exit_rcu+0x137/0x1d0 [ 778.360865] irq_exit_rcu+0xa/0x20 [ 778.361708] common_interrupt+0x80/0xa0 [ 778.362640] </IRQ> [ 778.363212] asm_common_interrupt+0x1e/0x40 [ 778.364204] RIP: 0010:native_safe_halt+0xe/0x10 [ 778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 <c3> 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00 [ 778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246 [ 778.370570] RAX ---truncated---
Impacted products
Vendor Product Version
Linux Linux Version: 038ebb1a713d114d54dbf14868a73181c0c92758
Version: 038ebb1a713d114d54dbf14868a73181c0c92758
Version: 038ebb1a713d114d54dbf14868a73181c0c92758
Create a notification for this product.
   Linux Linux Version: 5.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:24:40.228Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-47136",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-10T15:55:03.662373Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-11T17:33:16.207Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.c",
                  "drivers/net/ethernet/mellanox/mlx5/core/en_tc.c",
                  "include/net/pkt_cls.h",
                  "net/sched/cls_api.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "ac493452e937b8939eaf2d24cac51a4804b6c20e",
                     status: "affected",
                     version: "038ebb1a713d114d54dbf14868a73181c0c92758",
                     versionType: "git",
                  },
                  {
                     lessThan: "86ab133b695ed7ba1f8786b12f4ca43137ad8c18",
                     status: "affected",
                     version: "038ebb1a713d114d54dbf14868a73181c0c92758",
                     versionType: "git",
                  },
                  {
                     lessThan: "9453d45ecb6c2199d72e73c993e9d98677a2801b",
                     status: "affected",
                     version: "038ebb1a713d114d54dbf14868a73181c0c92758",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.c",
                  "drivers/net/ethernet/mellanox/mlx5/core/en_tc.c",
                  "include/net/pkt_cls.h",
                  "net/sched/cls_api.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "5.9",
                  },
                  {
                     lessThan: "5.9",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.42",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.12.*",
                     status: "unaffected",
                     version: "5.12.9",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "5.13",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: zero-initialize tc skb extension on allocation\n\nFunction skb_ext_add() doesn't initialize created skb extension with any\nvalue and leaves it up to the user. However, since extension of type\nTC_SKB_EXT originally contained only single value tc_skb_ext->chain its\nusers used to just assign the chain value without setting whole extension\nmemory to zero first. This assumption changed when TC_SKB_EXT extension was\nextended with additional fields but not all users were updated to\ninitialize the new fields which leads to use of uninitialized memory\nafterwards. UBSAN log:\n\n[  778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28\n[  778.301495] load of value 107 is not a valid value for type '_Bool'\n[  778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2\n[  778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n[  778.307901] Call Trace:\n[  778.308680]  <IRQ>\n[  778.309358]  dump_stack+0xbb/0x107\n[  778.310307]  ubsan_epilogue+0x5/0x40\n[  778.311167]  __ubsan_handle_load_invalid_value.cold+0x43/0x48\n[  778.312454]  ? memset+0x20/0x40\n[  778.313230]  ovs_flow_key_extract.cold+0xf/0x14 [openvswitch]\n[  778.314532]  ovs_vport_receive+0x19e/0x2e0 [openvswitch]\n[  778.315749]  ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch]\n[  778.317188]  ? create_prof_cpu_mask+0x20/0x20\n[  778.318220]  ? arch_stack_walk+0x82/0xf0\n[  778.319153]  ? secondary_startup_64_no_verify+0xb0/0xbb\n[  778.320399]  ? stack_trace_save+0x91/0xc0\n[  778.321362]  ? stack_trace_consume_entry+0x160/0x160\n[  778.322517]  ? lock_release+0x52e/0x760\n[  778.323444]  netdev_frame_hook+0x323/0x610 [openvswitch]\n[  778.324668]  ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch]\n[  778.325950]  __netif_receive_skb_core+0x771/0x2db0\n[  778.327067]  ? lock_downgrade+0x6e0/0x6f0\n[  778.328021]  ? lock_acquire+0x565/0x720\n[  778.328940]  ? generic_xdp_tx+0x4f0/0x4f0\n[  778.329902]  ? inet_gro_receive+0x2a7/0x10a0\n[  778.330914]  ? lock_downgrade+0x6f0/0x6f0\n[  778.331867]  ? udp4_gro_receive+0x4c4/0x13e0\n[  778.332876]  ? lock_release+0x52e/0x760\n[  778.333808]  ? dev_gro_receive+0xcc8/0x2380\n[  778.334810]  ? lock_downgrade+0x6f0/0x6f0\n[  778.335769]  __netif_receive_skb_list_core+0x295/0x820\n[  778.336955]  ? process_backlog+0x780/0x780\n[  778.337941]  ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core]\n[  778.339613]  ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0\n[  778.341033]  ? kvm_clock_get_cycles+0x14/0x20\n[  778.342072]  netif_receive_skb_list_internal+0x5f5/0xcb0\n[  778.343288]  ? __kasan_kmalloc+0x7a/0x90\n[  778.344234]  ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core]\n[  778.345676]  ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core]\n[  778.347140]  ? __netif_receive_skb_list_core+0x820/0x820\n[  778.348351]  ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core]\n[  778.349688]  ? napi_gro_flush+0x26c/0x3c0\n[  778.350641]  napi_complete_done+0x188/0x6b0\n[  778.351627]  mlx5e_napi_poll+0x373/0x1b80 [mlx5_core]\n[  778.352853]  __napi_poll+0x9f/0x510\n[  778.353704]  ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core]\n[  778.355158]  net_rx_action+0x34c/0xa40\n[  778.356060]  ? napi_threaded_poll+0x3d0/0x3d0\n[  778.357083]  ? sched_clock_cpu+0x18/0x190\n[  778.358041]  ? __common_interrupt+0x8e/0x1a0\n[  778.359045]  __do_softirq+0x1ce/0x984\n[  778.359938]  __irq_exit_rcu+0x137/0x1d0\n[  778.360865]  irq_exit_rcu+0xa/0x20\n[  778.361708]  common_interrupt+0x80/0xa0\n[  778.362640]  </IRQ>\n[  778.363212]  asm_common_interrupt+0x1e/0x40\n[  778.364204] RIP: 0010:native_safe_halt+0xe/0x10\n[  778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 <c3> 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00\n[  778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246\n[  778.370570] RAX\n---truncated---",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T07:35:54.660Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e",
            },
            {
               url: "https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18",
            },
            {
               url: "https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b",
            },
         ],
         title: "net: zero-initialize tc skb extension on allocation",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2021-47136",
      datePublished: "2024-03-25T09:07:36.064Z",
      dateReserved: "2024-03-04T18:12:48.840Z",
      dateUpdated: "2024-12-19T07:35:54.660Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         descriptions: "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: zero-initialize tc skb extension on allocation\\n\\nFunction skb_ext_add() doesn't initialize created skb extension with any\\nvalue and leaves it up to the user. However, since extension of type\\nTC_SKB_EXT originally contained only single value tc_skb_ext->chain its\\nusers used to just assign the chain value without setting whole extension\\nmemory to zero first. This assumption changed when TC_SKB_EXT extension was\\nextended with additional fields but not all users were updated to\\ninitialize the new fields which leads to use of uninitialized memory\\nafterwards. UBSAN log:\\n\\n[  778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28\\n[  778.301495] load of value 107 is not a valid value for type '_Bool'\\n[  778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2\\n[  778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\\n[  778.307901] Call Trace:\\n[  778.308680]  <IRQ>\\n[  778.309358]  dump_stack+0xbb/0x107\\n[  778.310307]  ubsan_epilogue+0x5/0x40\\n[  778.311167]  __ubsan_handle_load_invalid_value.cold+0x43/0x48\\n[  778.312454]  ? memset+0x20/0x40\\n[  778.313230]  ovs_flow_key_extract.cold+0xf/0x14 [openvswitch]\\n[  778.314532]  ovs_vport_receive+0x19e/0x2e0 [openvswitch]\\n[  778.315749]  ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch]\\n[  778.317188]  ? create_prof_cpu_mask+0x20/0x20\\n[  778.318220]  ? arch_stack_walk+0x82/0xf0\\n[  778.319153]  ? secondary_startup_64_no_verify+0xb0/0xbb\\n[  778.320399]  ? stack_trace_save+0x91/0xc0\\n[  778.321362]  ? stack_trace_consume_entry+0x160/0x160\\n[  778.322517]  ? lock_release+0x52e/0x760\\n[  778.323444]  netdev_frame_hook+0x323/0x610 [openvswitch]\\n[  778.324668]  ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch]\\n[  778.325950]  __netif_receive_skb_core+0x771/0x2db0\\n[  778.327067]  ? lock_downgrade+0x6e0/0x6f0\\n[  778.328021]  ? lock_acquire+0x565/0x720\\n[  778.328940]  ? generic_xdp_tx+0x4f0/0x4f0\\n[  778.329902]  ? inet_gro_receive+0x2a7/0x10a0\\n[  778.330914]  ? lock_downgrade+0x6f0/0x6f0\\n[  778.331867]  ? udp4_gro_receive+0x4c4/0x13e0\\n[  778.332876]  ? lock_release+0x52e/0x760\\n[  778.333808]  ? dev_gro_receive+0xcc8/0x2380\\n[  778.334810]  ? lock_downgrade+0x6f0/0x6f0\\n[  778.335769]  __netif_receive_skb_list_core+0x295/0x820\\n[  778.336955]  ? process_backlog+0x780/0x780\\n[  778.337941]  ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core]\\n[  778.339613]  ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0\\n[  778.341033]  ? kvm_clock_get_cycles+0x14/0x20\\n[  778.342072]  netif_receive_skb_list_internal+0x5f5/0xcb0\\n[  778.343288]  ? __kasan_kmalloc+0x7a/0x90\\n[  778.344234]  ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core]\\n[  778.345676]  ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core]\\n[  778.347140]  ? __netif_receive_skb_list_core+0x820/0x820\\n[  778.348351]  ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core]\\n[  778.349688]  ? napi_gro_flush+0x26c/0x3c0\\n[  778.350641]  napi_complete_done+0x188/0x6b0\\n[  778.351627]  mlx5e_napi_poll+0x373/0x1b80 [mlx5_core]\\n[  778.352853]  __napi_poll+0x9f/0x510\\n[  778.353704]  ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core]\\n[  778.355158]  net_rx_action+0x34c/0xa40\\n[  778.356060]  ? napi_threaded_poll+0x3d0/0x3d0\\n[  778.357083]  ? sched_clock_cpu+0x18/0x190\\n[  778.358041]  ? __common_interrupt+0x8e/0x1a0\\n[  778.359045]  __do_softirq+0x1ce/0x984\\n[  778.359938]  __irq_exit_rcu+0x137/0x1d0\\n[  778.360865]  irq_exit_rcu+0xa/0x20\\n[  778.361708]  common_interrupt+0x80/0xa0\\n[  778.362640]  </IRQ>\\n[  778.363212]  asm_common_interrupt+0x1e/0x40\\n[  778.364204] RIP: 0010:native_safe_halt+0xe/0x10\\n[  778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 <c3> 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00\\n[  778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246\\n[  778.370570] RAX\\n---truncated---\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: inicializaci\\u00f3n cero de la extensi\\u00f3n tc skb en la asignaci\\u00f3n La funci\\u00f3n skb_ext_add() no inicializa la extensi\\u00f3n skb creada con ning\\u00fan valor y lo deja en manos del usuario. Sin embargo, dado que la extensi\\u00f3n de tipo TC_SKB_EXT originalmente conten\\u00eda solo un valor \\u00fanico tc_skb_ext-&gt;chain, sus usuarios sol\\u00edan asignar simplemente el valor de la cadena sin establecer primero toda la memoria de extensi\\u00f3n en cero. Esta suposici\\u00f3n cambi\\u00f3 cuando la extensi\\u00f3n TC_SKB_EXT se ampli\\u00f3 con campos adicionales, pero no todos los usuarios se actualizaron para inicializar los nuevos campos, lo que lleva al uso de memoria no inicializada posteriormente. Registro de UBSAN: [778.299821] UBSAN: carga no v\\u00e1lida en net/openvswitch/flow.c:899:28 [778.301495] la carga del valor 107 no es un valor v\\u00e1lido para el tipo '_Bool' [778.303215] CPU: 0 PID: 0 Comm : swapper/0 Not tainted 5.12.0-rc7+ #2 [ 778.304933] Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/ 2014 [778.307901] Seguimiento de llamadas: [778.308680]  [778.309358] dump_stack+0xbb/0x107 [778.310307] ubsan_epilogue+0x5/0x40 [778.311167] __ubsan_handle_load_invalid_value.col d+0x43/0x48 [778.312454]? memset+0x20/0x40 [778.313230] ovs_flow_key_extract.cold+0xf/0x14 [openvswitch] [778.314532] ovs_vport_receive+0x19e/0x2e0 [openvswitch] [778.315749]? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch] [778.317188]? create_prof_cpu_mask+0x20/0x20 [778.318220]? arch_stack_walk+0x82/0xf0 [778.319153]? second_startup_64_no_verify+0xb0/0xbb [778.320399]? stack_trace_save+0x91/0xc0 [778.321362]? stack_trace_consume_entry+0x160/0x160 [778.322517]? lock_release+0x52e/0x760 [778.323444] netdev_frame_hook+0x323/0x610 [openvswitch] [778.324668]? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch] [778.325950] __netif_receive_skb_core+0x771/0x2db0 [778.327067]? lock_downgrade+0x6e0/0x6f0 [778.328021]? lock_acquire+0x565/0x720 [778.328940]? generic_xdp_tx+0x4f0/0x4f0 [778.329902]? inet_gro_receive+0x2a7/0x10a0 [778.330914]? lock_downgrade+0x6f0/0x6f0 [778.331867]? udp4_gro_receive+0x4c4/0x13e0 [778.332876]? lock_release+0x52e/0x760 [778.333808]? dev_gro_receive+0xcc8/0x2380 [778.334810]? lock_downgrade+0x6f0/0x6f0 [ 778.335769] __netif_receive_skb_list_core+0x295/0x820 [ 778.336955] ? proceso_backlog+0x780/0x780 [778.337941]? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core] [778.339613]? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0 [778.341033]? kvm_clock_get_cycles+0x14/0x20 [ 778.342072] netif_receive_skb_list_internal+0x5f5/0xcb0 [ 778.343288] ? __kasan_kmalloc+0x7a/0x90 [778.344234]? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core] [778.345676]? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core] [778.347140]? __netif_receive_skb_list_core+0x820/0x820 [778.348351]? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core] [778.349688]? napi_gro_flush+0x26c/0x3c0 [ 778.350641] napi_complete_done+0x188/0x6b0 [ 778.351627] mlx5e_napi_poll+0x373/0x1b80 [mlx5_core] [ 778.352853] __napi_poll+0x9f/0x510 [778.353704] ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core] [778.355158] net_rx_action+0x34c/0xa40 [778.356060]? napi_threaded_poll+0x3d0/0x3d0 [778.357083]? sched_clock_cpu+0x18/0x190 [778.358041]? __common_interrupt+0x8e/0x1a0 [ 778.359045] __do_softirq+0x1ce/0x984 [ 778.359938] __irq_exit_rcu+0x137/0x1d0 [ 778.360865] irq_exit_rcu+0xa/0x20 [ 778.36170 8] interrupci\\u00f3n_com\\u00fan+0x80/0xa0 [ 778.362640]  [ 778.363212] asm_interrupci\\u00f3n_com\\u00fan+0x1e /0x40 [ 778.364204] RIP: 0010:native_safe_halt+0xe/0x10 [ 778.365273] C\\u00f3digo: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e 9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4  90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00 [ 778.369355] RSP: 0018:ffffffff84407 e48 EFLAGS: 00000246 [778.370570] RAX ---truncado---\"}]",
         id: "CVE-2021-47136",
         lastModified: "2024-11-21T06:35:28.190",
         published: "2024-03-25T09:15:07.970",
         references: "[{\"url\": \"https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
         sourceIdentifier: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
         vulnStatus: "Awaiting Analysis",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2021-47136\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-03-25T09:15:07.970\",\"lastModified\":\"2025-03-13T21:09:56.750\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: zero-initialize tc skb extension on allocation\\n\\nFunction skb_ext_add() doesn't initialize created skb extension with any\\nvalue and leaves it up to the user. However, since extension of type\\nTC_SKB_EXT originally contained only single value tc_skb_ext->chain its\\nusers used to just assign the chain value without setting whole extension\\nmemory to zero first. This assumption changed when TC_SKB_EXT extension was\\nextended with additional fields but not all users were updated to\\ninitialize the new fields which leads to use of uninitialized memory\\nafterwards. UBSAN log:\\n\\n[  778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28\\n[  778.301495] load of value 107 is not a valid value for type '_Bool'\\n[  778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2\\n[  778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\\n[  778.307901] Call Trace:\\n[  778.308680]  <IRQ>\\n[  778.309358]  dump_stack+0xbb/0x107\\n[  778.310307]  ubsan_epilogue+0x5/0x40\\n[  778.311167]  __ubsan_handle_load_invalid_value.cold+0x43/0x48\\n[  778.312454]  ? memset+0x20/0x40\\n[  778.313230]  ovs_flow_key_extract.cold+0xf/0x14 [openvswitch]\\n[  778.314532]  ovs_vport_receive+0x19e/0x2e0 [openvswitch]\\n[  778.315749]  ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch]\\n[  778.317188]  ? create_prof_cpu_mask+0x20/0x20\\n[  778.318220]  ? arch_stack_walk+0x82/0xf0\\n[  778.319153]  ? secondary_startup_64_no_verify+0xb0/0xbb\\n[  778.320399]  ? stack_trace_save+0x91/0xc0\\n[  778.321362]  ? stack_trace_consume_entry+0x160/0x160\\n[  778.322517]  ? lock_release+0x52e/0x760\\n[  778.323444]  netdev_frame_hook+0x323/0x610 [openvswitch]\\n[  778.324668]  ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch]\\n[  778.325950]  __netif_receive_skb_core+0x771/0x2db0\\n[  778.327067]  ? lock_downgrade+0x6e0/0x6f0\\n[  778.328021]  ? lock_acquire+0x565/0x720\\n[  778.328940]  ? generic_xdp_tx+0x4f0/0x4f0\\n[  778.329902]  ? inet_gro_receive+0x2a7/0x10a0\\n[  778.330914]  ? lock_downgrade+0x6f0/0x6f0\\n[  778.331867]  ? udp4_gro_receive+0x4c4/0x13e0\\n[  778.332876]  ? lock_release+0x52e/0x760\\n[  778.333808]  ? dev_gro_receive+0xcc8/0x2380\\n[  778.334810]  ? lock_downgrade+0x6f0/0x6f0\\n[  778.335769]  __netif_receive_skb_list_core+0x295/0x820\\n[  778.336955]  ? process_backlog+0x780/0x780\\n[  778.337941]  ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core]\\n[  778.339613]  ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0\\n[  778.341033]  ? kvm_clock_get_cycles+0x14/0x20\\n[  778.342072]  netif_receive_skb_list_internal+0x5f5/0xcb0\\n[  778.343288]  ? __kasan_kmalloc+0x7a/0x90\\n[  778.344234]  ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core]\\n[  778.345676]  ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core]\\n[  778.347140]  ? __netif_receive_skb_list_core+0x820/0x820\\n[  778.348351]  ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core]\\n[  778.349688]  ? napi_gro_flush+0x26c/0x3c0\\n[  778.350641]  napi_complete_done+0x188/0x6b0\\n[  778.351627]  mlx5e_napi_poll+0x373/0x1b80 [mlx5_core]\\n[  778.352853]  __napi_poll+0x9f/0x510\\n[  778.353704]  ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core]\\n[  778.355158]  net_rx_action+0x34c/0xa40\\n[  778.356060]  ? napi_threaded_poll+0x3d0/0x3d0\\n[  778.357083]  ? sched_clock_cpu+0x18/0x190\\n[  778.358041]  ? __common_interrupt+0x8e/0x1a0\\n[  778.359045]  __do_softirq+0x1ce/0x984\\n[  778.359938]  __irq_exit_rcu+0x137/0x1d0\\n[  778.360865]  irq_exit_rcu+0xa/0x20\\n[  778.361708]  common_interrupt+0x80/0xa0\\n[  778.362640]  </IRQ>\\n[  778.363212]  asm_common_interrupt+0x1e/0x40\\n[  778.364204] RIP: 0010:native_safe_halt+0xe/0x10\\n[  778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 <c3> 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00\\n[  778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246\\n[  778.370570] RAX\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: inicialización cero de la extensión tc skb en la asignación La función skb_ext_add() no inicializa la extensión skb creada con ningún valor y lo deja en manos del usuario. Sin embargo, dado que la extensión de tipo TC_SKB_EXT originalmente contenía solo un valor único tc_skb_ext-&gt;chain, sus usuarios solían asignar simplemente el valor de la cadena sin establecer primero toda la memoria de extensión en cero. Esta suposición cambió cuando la extensión TC_SKB_EXT se amplió con campos adicionales, pero no todos los usuarios se actualizaron para inicializar los nuevos campos, lo que lleva al uso de memoria no inicializada posteriormente. Registro de UBSAN: [778.299821] UBSAN: carga no válida en net/openvswitch/flow.c:899:28 [778.301495] la carga del valor 107 no es un valor válido para el tipo '_Bool' [778.303215] CPU: 0 PID: 0 Comm : swapper/0 Not tainted 5.12.0-rc7+ #2 [ 778.304933] Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/ 2014 [778.307901] Seguimiento de llamadas: [778.308680]  [778.309358] dump_stack+0xbb/0x107 [778.310307] ubsan_epilogue+0x5/0x40 [778.311167] __ubsan_handle_load_invalid_value.col d+0x43/0x48 [778.312454]? memset+0x20/0x40 [778.313230] ovs_flow_key_extract.cold+0xf/0x14 [openvswitch] [778.314532] ovs_vport_receive+0x19e/0x2e0 [openvswitch] [778.315749]? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch] [778.317188]? create_prof_cpu_mask+0x20/0x20 [778.318220]? arch_stack_walk+0x82/0xf0 [778.319153]? second_startup_64_no_verify+0xb0/0xbb [778.320399]? stack_trace_save+0x91/0xc0 [778.321362]? stack_trace_consume_entry+0x160/0x160 [778.322517]? lock_release+0x52e/0x760 [778.323444] netdev_frame_hook+0x323/0x610 [openvswitch] [778.324668]? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch] [778.325950] __netif_receive_skb_core+0x771/0x2db0 [778.327067]? lock_downgrade+0x6e0/0x6f0 [778.328021]? lock_acquire+0x565/0x720 [778.328940]? generic_xdp_tx+0x4f0/0x4f0 [778.329902]? inet_gro_receive+0x2a7/0x10a0 [778.330914]? lock_downgrade+0x6f0/0x6f0 [778.331867]? udp4_gro_receive+0x4c4/0x13e0 [778.332876]? lock_release+0x52e/0x760 [778.333808]? dev_gro_receive+0xcc8/0x2380 [778.334810]? lock_downgrade+0x6f0/0x6f0 [ 778.335769] __netif_receive_skb_list_core+0x295/0x820 [ 778.336955] ? proceso_backlog+0x780/0x780 [778.337941]? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core] [778.339613]? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0 [778.341033]? kvm_clock_get_cycles+0x14/0x20 [ 778.342072] netif_receive_skb_list_internal+0x5f5/0xcb0 [ 778.343288] ? __kasan_kmalloc+0x7a/0x90 [778.344234]? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core] [778.345676]? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core] [778.347140]? __netif_receive_skb_list_core+0x820/0x820 [778.348351]? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core] [778.349688]? napi_gro_flush+0x26c/0x3c0 [ 778.350641] napi_complete_done+0x188/0x6b0 [ 778.351627] mlx5e_napi_poll+0x373/0x1b80 [mlx5_core] [ 778.352853] __napi_poll+0x9f/0x510 [778.353704] ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core] [778.355158] net_rx_action+0x34c/0xa40 [778.356060]? napi_threaded_poll+0x3d0/0x3d0 [778.357083]? sched_clock_cpu+0x18/0x190 [778.358041]? __common_interrupt+0x8e/0x1a0 [ 778.359045] __do_softirq+0x1ce/0x984 [ 778.359938] __irq_exit_rcu+0x137/0x1d0 [ 778.360865] irq_exit_rcu+0xa/0x20 [ 778.36170 8] interrupción_común+0x80/0xa0 [ 778.362640]  [ 778.363212] asm_interrupción_común+0x1e /0x40 [ 778.364204] RIP: 0010:native_safe_halt+0xe/0x10 [ 778.365273] Código: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e 9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4  90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00 [ 778.369355] RSP: 0018:ffffffff84407 e48 EFLAGS: 00000246 [778.370570] RAX ---truncado---\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.9\",\"versionEndExcluding\":\"5.10.42\",\"matchCriteriaId\":\"99FB130A-0C42-4431-99E0-8850107159B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.12.9\",\"matchCriteriaId\":\"2C8A1D02-81A7-44E5-ACFD-CC6A6694F930\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"96AC23B2-D46A-49D9-8203-8E1BEDCA8532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA610E30-717C-4700-9F77-A3C9244F3BFD\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:40.228Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47136\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:55:03.662373Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:15.823Z\"}}], \"cna\": {\"title\": \"net: zero-initialize tc skb extension on allocation\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"038ebb1a713d\", \"lessThan\": \"ac493452e937\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"038ebb1a713d\", \"lessThan\": \"86ab133b695e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"038ebb1a713d\", \"lessThan\": \"9453d45ecb6c\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.c\", \"drivers/net/ethernet/mellanox/mlx5/core/en_tc.c\", \"include/net/pkt_cls.h\", \"net/sched/cls_api.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.42\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.c\", \"drivers/net/ethernet/mellanox/mlx5/core/en_tc.c\", \"include/net/pkt_cls.h\", \"net/sched/cls_api.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e\"}, {\"url\": \"https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18\"}, {\"url\": \"https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b\"}], \"x_generator\": {\"engine\": \"bippy-9e1c9544281a\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: zero-initialize tc skb extension on allocation\\n\\nFunction skb_ext_add() doesn't initialize created skb extension with any\\nvalue and leaves it up to the user. However, since extension of type\\nTC_SKB_EXT originally contained only single value tc_skb_ext->chain its\\nusers used to just assign the chain value without setting whole extension\\nmemory to zero first. This assumption changed when TC_SKB_EXT extension was\\nextended with additional fields but not all users were updated to\\ninitialize the new fields which leads to use of uninitialized memory\\nafterwards. UBSAN log:\\n\\n[  778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28\\n[  778.301495] load of value 107 is not a valid value for type '_Bool'\\n[  778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2\\n[  778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\\n[  778.307901] Call Trace:\\n[  778.308680]  <IRQ>\\n[  778.309358]  dump_stack+0xbb/0x107\\n[  778.310307]  ubsan_epilogue+0x5/0x40\\n[  778.311167]  __ubsan_handle_load_invalid_value.cold+0x43/0x48\\n[  778.312454]  ? memset+0x20/0x40\\n[  778.313230]  ovs_flow_key_extract.cold+0xf/0x14 [openvswitch]\\n[  778.314532]  ovs_vport_receive+0x19e/0x2e0 [openvswitch]\\n[  778.315749]  ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch]\\n[  778.317188]  ? create_prof_cpu_mask+0x20/0x20\\n[  778.318220]  ? arch_stack_walk+0x82/0xf0\\n[  778.319153]  ? secondary_startup_64_no_verify+0xb0/0xbb\\n[  778.320399]  ? stack_trace_save+0x91/0xc0\\n[  778.321362]  ? stack_trace_consume_entry+0x160/0x160\\n[  778.322517]  ? lock_release+0x52e/0x760\\n[  778.323444]  netdev_frame_hook+0x323/0x610 [openvswitch]\\n[  778.324668]  ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch]\\n[  778.325950]  __netif_receive_skb_core+0x771/0x2db0\\n[  778.327067]  ? lock_downgrade+0x6e0/0x6f0\\n[  778.328021]  ? lock_acquire+0x565/0x720\\n[  778.328940]  ? generic_xdp_tx+0x4f0/0x4f0\\n[  778.329902]  ? inet_gro_receive+0x2a7/0x10a0\\n[  778.330914]  ? lock_downgrade+0x6f0/0x6f0\\n[  778.331867]  ? udp4_gro_receive+0x4c4/0x13e0\\n[  778.332876]  ? lock_release+0x52e/0x760\\n[  778.333808]  ? dev_gro_receive+0xcc8/0x2380\\n[  778.334810]  ? lock_downgrade+0x6f0/0x6f0\\n[  778.335769]  __netif_receive_skb_list_core+0x295/0x820\\n[  778.336955]  ? process_backlog+0x780/0x780\\n[  778.337941]  ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core]\\n[  778.339613]  ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0\\n[  778.341033]  ? kvm_clock_get_cycles+0x14/0x20\\n[  778.342072]  netif_receive_skb_list_internal+0x5f5/0xcb0\\n[  778.343288]  ? __kasan_kmalloc+0x7a/0x90\\n[  778.344234]  ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core]\\n[  778.345676]  ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core]\\n[  778.347140]  ? __netif_receive_skb_list_core+0x820/0x820\\n[  778.348351]  ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core]\\n[  778.349688]  ? napi_gro_flush+0x26c/0x3c0\\n[  778.350641]  napi_complete_done+0x188/0x6b0\\n[  778.351627]  mlx5e_napi_poll+0x373/0x1b80 [mlx5_core]\\n[  778.352853]  __napi_poll+0x9f/0x510\\n[  778.353704]  ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core]\\n[  778.355158]  net_rx_action+0x34c/0xa40\\n[  778.356060]  ? napi_threaded_poll+0x3d0/0x3d0\\n[  778.357083]  ? sched_clock_cpu+0x18/0x190\\n[  778.358041]  ? __common_interrupt+0x8e/0x1a0\\n[  778.359045]  __do_softirq+0x1ce/0x984\\n[  778.359938]  __irq_exit_rcu+0x137/0x1d0\\n[  778.360865]  irq_exit_rcu+0xa/0x20\\n[  778.361708]  common_interrupt+0x80/0xa0\\n[  778.362640]  </IRQ>\\n[  778.363212]  asm_common_interrupt+0x1e/0x40\\n[  778.364204] RIP: 0010:native_safe_halt+0xe/0x10\\n[  778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 <c3> 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00\\n[  778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246\\n[  778.370570] RAX\\n---truncated---\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-11-04T12:00:10.759Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2021-47136\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-04T12:00:10.759Z\", \"dateReserved\": \"2024-03-04T18:12:48.840Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-25T09:07:36.064Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.