CVE-2021-47265
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/05/2024
Last modified:
30/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA: Verify port when creating flow rule<br />
<br />
Validate port value provided by the user and with that remove no longer<br />
needed validation by the driver. The missing check in the mlx5_ib driver<br />
could cause to the below oops.<br />
<br />
Call trace:<br />
_create_flow_rule+0x2d4/0xf28 [mlx5_ib]<br />
mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib]<br />
ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs]<br />
ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x150 [ib_uverbs]<br />
ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs]<br />
ib_uverbs_ioctl+0x158/0x1d0 [ib_uverbs]<br />
do_vfs_ioctl+0xd0/0xaf0<br />
ksys_ioctl+0x84/0xb4<br />
__arm64_sys_ioctl+0x28/0xc4<br />
el0_svc_common.constprop.3+0xa4/0x254<br />
el0_svc_handler+0x84/0xa0<br />
el0_svc+0x10/0x26c<br />
Code: b9401260 f9615681 51000400 8b001c20 (f9403c1a)
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.12 (including) | 5.12.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



