In the Linux kernel, the following vulnerability has been resolved:
neighbour: allow NUD_NOARP entries to be forced GCed
IFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to
fill up the neighbour table with enough entries that it will overflow for
valid connections after that.
This behaviour is more prevalent after commit 58956317c8de ("neighbor:
Improve garbage collection") is applied, as it prevents removal from
entries that are not NUD_FAILED, unless they are more than 5s old.
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-03-15T20:14:18.469Z
Updated: 2024-11-04T11:59:34.892Z
Reserved: 2024-03-04T18:12:48.836Z
Link: CVE-2021-47109
Vulnrichment
Updated: 2024-08-04T05:24:39.847Z
NVD
Status : Awaiting Analysis
Published: 2024-03-15T21:15:06.457
Modified: 2024-11-21T06:35:24.957
Link: CVE-2021-47109
Redhat