vulnerability
Ubuntu: (CVE-2021-47109): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Mar 15, 2024 | Nov 19, 2024 | Jun 12, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Mar 15, 2024
Added
Nov 19, 2024
Modified
Jun 12, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
neighbour: allow NUD_NOARP entries to be forced GCed
IFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to
fill up the neighbour table with enough entries that it will overflow for
valid connections after that.
This behaviour is more prevalent after commit 58956317c8de ("neighbor:
Improve garbage collection") is applied, as it prevents removal from
entries that are not NUD_FAILED, unless they are more than 5s old.
Solution(s)
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-4ubuntu-upgrade-linux-aws-fipsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-4ubuntu-upgrade-linux-azure-fipsubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-fipsubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-4ubuntu-upgrade-linux-gcp-fipsubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hwe-5-4ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-4ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-raspi-5-4
References
- CVE-2021-47109
- https://attackerkb.com/topics/CVE-2021-47109
- URL-https://git.kernel.org/linus/7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f
- URL-https://git.kernel.org/stable/c/7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f
- URL-https://git.kernel.org/stable/c/d17d47da59f726dc4c87caebda3a50333d7e2fd3
- URL-https://git.kernel.org/stable/c/d99029e6aab62aef0a0251588b2867e77e83b137
- URL-https://git.kernel.org/stable/c/ddf088d7aaaaacfc836104f2e632b29b1d383cfc
- URL-https://www.cve.org/CVERecord?id=CVE-2021-47109

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.