First published: Fri Mar 15 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: neighbour: allow NUD_NOARP entries to be forced GCed IFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to fill up the neighbour table with enough entries that it will overflow for valid connections after that. This behaviour is more prevalent after commit 58956317c8de ("neighbor: Improve garbage collection") is applied, as it prevents removal from entries that are not NUD_FAILED, unless they are more than 5s old.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | >=5.0<5.4.125 | |
Linux Kernel | >=5.5<5.10.43 | |
Linux Kernel | >=5.11<5.12.10 | |
Linux Kernel | =5.13-rc1 | |
Linux Kernel | =5.13-rc2 | |
Linux Kernel | =5.13-rc3 | |
Linux Kernel | =5.13-rc4 | |
Linux Kernel | =5.13-rc5 | |
Linux Kernel | =5.13-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47109 is categorized as a medium severity vulnerability in the Linux kernel affecting neighbor table management.
To fix CVE-2021-47109, upgrade your Linux kernel to a version that has patched this vulnerability.
CVE-2021-47109 affects multiple versions of the Linux kernel from 5.0 to 5.13-rc6.
The impact of CVE-2021-47109 can lead to resource exhaustion by overflowing the neighbor table, potentially affecting network communication.
CVE-2021-47109 does not directly expose remote exploitation risks but can lead to denial of service conditions affecting performance.