6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
13.4%
Guest can force Linux netback driver to hog large amounts of kernel memory
T[his CNA information record relates to multiple CVEs; the text explains
which aspects/vulnerabilities correspond to which CVE.] Incoming data
packets for a guest in the Linux kernel’s netback driver are buffered until
the guest is ready to process them. There are some measures taken for
avoiding to pile up too much data, but those can be bypassed by the guest:
There is a timeout how long the client side of an interface can stop
consuming new packets before it is assumed to have stalled, but this
timeout is rather long (60 seconds by default). Using a UDP connection on a
fast interface can easily accumulate gigabytes of data in that time.
(CVE-2021-28715) The timeout could even never trigger if the guest manages
to have only one free slot in its RX queue ring page and the next package
would require more than one free slot, which may be the case when using
GSO, XDP, or software hashing. (CVE-2021-28714)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-169.177 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < 5.4.0-105.119 | UNKNOWN |
ubuntu | 21.10 | noarch | linux | < 5.13.0-37.42 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1121.129 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1069.73 | UNKNOWN |
ubuntu | 21.10 | noarch | linux-aws | < 5.13.0-1019.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.13 | < 5.13.0-1019.21~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1069.73~18.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1120.128~16.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1073.76 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2021-28715
nvd.nist.gov/vuln/detail/CVE-2021-28715
security-tracker.debian.org/tracker/CVE-2021-28715
ubuntu.com/security/notices/USN-5278-1
ubuntu.com/security/notices/USN-5298-1
ubuntu.com/security/notices/USN-5337-1
ubuntu.com/security/notices/USN-5338-1
ubuntu.com/security/notices/USN-5368-1
ubuntu.com/security/notices/USN-5377-1
www.cve.org/CVERecord?id=CVE-2021-28715
xenbits.xen.org/xsa/advisory-392.html
6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.0004 Low
EPSS
Percentile
13.4%