
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-36281 affects the Linux kernel's Mellanox MLX5 network driver implementation. The vulnerability was discovered in the IPsec status rules handling where rxcreate no longer allocates a modifyhdr instance that needs to be cleaned up (Kernel Commit).
The vulnerability stems from an incorrect cleanup of IPsec status rules in the MLX5 network driver. The issue occurs when mlx5modifyheaderdealloc is called on an unallocated modifyhdr instance, leading to a NULL pointer dereference. Additionally, a memory leak exists due to improper handling of two rules populated related to status (Kernel Commit).
When exploited, this vulnerability can cause a kernel NULL pointer dereference, resulting in a system crash (kernel panic) and denial of service condition (SUSE Advisory).
The vulnerability has been patched in the Linux kernel by replacing the incorrect cleanup calls with mlx5ipsecrxstatusdestroy to properly handle the status rules deletion. Users should update their systems with the latest kernel version that includes this fix (Ubuntu Notice).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."