Логотип exploitDog
bind:CVE-2021-47574
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-47574

Количество 3

Количество 3

redhat логотип

CVE-2021-47574

больше 1 года назад

[REJECTED CVE] The Xen netfront driver in the Linux kernel was vulnerable to attacks via an excessive number of events sent by the backend, leading to event channel storms.

EPSS: Низкий
nvd логотип

CVE-2021-47574

больше 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
github логотип

GHSA-98h7-44q6-g924

больше 1 года назад

In the Linux kernel, the following vulnerability has been resolved: xen/netfront: harden netfront against event channel storms The Xen netfront driver is still vulnerable for an attack via excessive number of events sent by the backend. Fix that by using lateeoi event channels. For being able to detect the case of no rx responses being added while the carrier is down a new lock is needed in order to update and test rsp_cons and the number of seen unconsumed responses atomically. This is part of XSA-391 --- V2: - don't eoi irq in case of interface set broken (Jan Beulich) - handle carrier off + no new responses added (Jan Beulich) V3: - add rx_ prefix to rsp_unconsumed (Jan Beulich) - correct xennet_set_rx_rsp_cons() spelling (Jan Beulich)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2021-47574

[REJECTED CVE] The Xen netfront driver in the Linux kernel was vulnerable to attacks via an excessive number of events sent by the backend, leading to event channel storms.

больше 1 года назад
nvd логотип
CVE-2021-47574

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

больше 1 года назад
github логотип
GHSA-98h7-44q6-g924

In the Linux kernel, the following vulnerability has been resolved: xen/netfront: harden netfront against event channel storms The Xen netfront driver is still vulnerable for an attack via excessive number of events sent by the backend. Fix that by using lateeoi event channels. For being able to detect the case of no rx responses being added while the carrier is down a new lock is needed in order to update and test rsp_cons and the number of seen unconsumed responses atomically. This is part of XSA-391 --- V2: - don't eoi irq in case of interface set broken (Jan Beulich) - handle carrier off + no new responses added (Jan Beulich) V3: - add rx_ prefix to rsp_unconsumed (Jan Beulich) - correct xennet_set_rx_rsp_cons() spelling (Jan Beulich)

больше 1 года назад

Уязвимостей на страницу