Lucene search

K

CVE-2021-47099

🗓️ 05 Mar 2024 16:48:07Reported by redhat.comType 
redhatcve
 redhatcve
🔗 access.redhat.com👁 16 Views

The Linux kernel vulnerability CVE-2021-47099 has been resolved by ensuring that skb entering GRO are not cloned. A bug was reported due to the condition where shared/cloned skbs could enter the GRO engine, triggering a kernel BUG at net/core/skbuff.c:3574. The issue was addressed by skipping the GRO stage for shared or cloned skbs, and uncloning the skbs before giving up.

Show more
Related
Refs
ReporterTitlePublishedViews
Family
CVE
CVE-2021-47099
4 Mar 202418:15
cve
Prion
Spoofing
4 Mar 202418:15
prion
Debian CVE
CVE-2021-47099
4 Mar 202418:15
debiancve
Cvelist
CVE-2021-47099 veth: ensure skb entering GRO are not cloned.
4 Mar 202418:10
cvelist
NVD
CVE-2021-47099
4 Mar 202418:15
nvd
Vulnrichment
CVE-2021-47099 veth: ensure skb entering GRO are not cloned.
4 Mar 202418:10
vulnrichment
UbuntuCve
CVE-2021-47099
4 Mar 202400:00
ubuntucve
Tenable Nessus
RHEL 8 : kernel (RHSA-2024:1877)
18 Apr 202400:00
nessus
Tenable Nessus
SUSE SLES15 Security Update : kernel (SUSE-SU-2024:1321-1)
18 Apr 202400:00
nessus
Tenable Nessus
SUSE SLES15 / openSUSE 15 Security Update : kernel (SUSE-SU-2024:1322-1)
18 Apr 202400:00
nessus
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
05 Mar 2024 16:07Current
6.5Medium risk
Vulners AI Score6.5
CVSS36.0
EPSS0.000
16
.json
Report