The Linux kernel vulnerability CVE-2021-47099 has been resolved by ensuring that skb entering GRO are not cloned. A bug was reported due to the condition where shared/cloned skbs could enter the GRO engine, triggering a kernel BUG at net/core/skbuff.c:3574. The issue was addressed by skipping the GRO stage for shared or cloned skbs, and uncloning the skbs before giving up.
Reporter | Title | Published | Views | Family All 39 |
---|---|---|---|---|
CVE | CVE-2021-47099 | 4 Mar 202418:15 | – | cve |
Prion | Spoofing | 4 Mar 202418:15 | – | prion |
Debian CVE | CVE-2021-47099 | 4 Mar 202418:15 | – | debiancve |
Cvelist | CVE-2021-47099 veth: ensure skb entering GRO are not cloned. | 4 Mar 202418:10 | – | cvelist |
NVD | CVE-2021-47099 | 4 Mar 202418:15 | – | nvd |
Vulnrichment | CVE-2021-47099 veth: ensure skb entering GRO are not cloned. | 4 Mar 202418:10 | – | vulnrichment |
UbuntuCve | CVE-2021-47099 | 4 Mar 202400:00 | – | ubuntucve |
Tenable Nessus | RHEL 8 : kernel (RHSA-2024:1877) | 18 Apr 202400:00 | – | nessus |
Tenable Nessus | SUSE SLES15 Security Update : kernel (SUSE-SU-2024:1321-1) | 18 Apr 202400:00 | – | nessus |
Tenable Nessus | SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:1322-1) | 18 Apr 202400:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo