{"id":"CVE-2021-47215","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: kTLS, Fix crash in RX resync flow\n\nFor the TLS RX resync flow, we maintain a list of TLS contexts\nthat require some attention, to communicate their resync information\nto the HW.\nHere we fix list corruptions, by protecting the entries against\nmovements coming from resync_handle_seq_match(), until their resync\nhandling in napi is fully completed.","modified":"2026-03-15T22:43:07.990973Z","published":"2024-04-10T19:15:48.727Z","related":["SUSE-SU-2024:1641-1","SUSE-SU-2024:1644-1","SUSE-SU-2024:1647-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/cc4a9cc03faa6d8db1a6954bb536f2c1e63bdff6"},{"type":"FIX","url":"https://git.kernel.org/stable/c/ebeda7a9528ae690e6bf12791a868f0cca8391f2"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.13"},{"fixed":"5.15.5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.16-rc1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47215.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}