In the Linux kernel, the following vulnerability has been resolved:
neighbour: allow NUD_NOARP entries to be forced GCed
IFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to
fill up the neighbour table with enough entries that it will overflow for
valid connections after that.
This behaviour is more prevalent after commit 58956317c8de ("neighbor:
Improve garbage collection") is applied, as it prevents removal from
entries that are not NUD_FAILED, unless they are more than 5s old.
References
Configurations
Configuration 1 (hide)
|
History
27 Feb 2025, 03:20
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f - Patch | |
References | () https://git.kernel.org/stable/c/d17d47da59f726dc4c87caebda3a50333d7e2fd3 - Patch | |
References | () https://git.kernel.org/stable/c/d99029e6aab62aef0a0251588b2867e77e83b137 - Patch | |
References | () https://git.kernel.org/stable/c/ddf088d7aaaaacfc836104f2e632b29b1d383cfc - Patch | |
First Time |
Linux linux Kernel
Linux |
Information
Published : 2024-03-15 21:15
Updated : 2025-02-27 03:20
NVD link : CVE-2021-47109
Mitre link : CVE-2021-47109
CVE.ORG link : CVE-2021-47109
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound