Логотип exploitDog
bind:CVE-2021-28714
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-28714

Количество 18

Количество 18

ubuntu логотип

CVE-2021-28714

около 4 лет назад

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-28714

около 4 лет назад

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2021-28714

около 4 лет назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2021-28714

около 4 лет назад

Guest can force Linux netback driver to hog large amounts of kernel me ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3f3x-x2x3-wvhg

около 4 лет назад

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2022-04444

около 4 лет назад

Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0131-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0131-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0056-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0056-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0090-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0068-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0080-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0197-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0366-1

почти 4 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0371-1

почти 4 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0367-1

почти 4 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0366-1

почти 4 года назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-28714

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

CVSS3: 6.5
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-28714

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

CVSS3: 6.5
0%
Низкий
около 4 лет назад
msrc логотип
CVSS3: 6.5
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-28714

Guest can force Linux netback driver to hog large amounts of kernel me ...

CVSS3: 6.5
0%
Низкий
около 4 лет назад
github логотип
GHSA-3f3x-x2x3-wvhg

Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)

CVSS3: 6.5
0%
Низкий
около 4 лет назад
fstec логотип
BDU:2022-04444

Уязвимость драйвера netback ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0131-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0131-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0056-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0056-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0090-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0068-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0080-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0197-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0366-1

Security update for the Linux Kernel

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0371-1

Security update for the Linux Kernel

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0367-1

Security update for the Linux Kernel

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0366-1

Security update for the Linux Kernel

почти 4 года назад

Уязвимостей на страницу