CVE-2021-28715
Public on 2022-01-06
Modified on 2022-02-04
Description
Incoming data packets for a guest in the Linux kernel’s netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | kernel | 2022-02-04 | ALAS-2022-1563 | Fixed |
Amazon Linux 1 | kernel | 2023-02-17 | ALAS-2023-1688 | Fixed |
Amazon Linux 2 - Core | kernel | 2022-02-04 | ALAS2-2022-1749 | Fixed |
Amazon Linux 2 - Kernel-5.10 Extra | kernel | 2022-01-26 | ALAS2KERNEL-5.10-2022-009 | Fixed |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2022-01-26 | ALAS2KERNEL-5.4-2022-021 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 5.0 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L |
NVD | CVSSv3 | 6.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
NVD | CVSSv2 | 2.1 | AV:L/AC:L/Au:N/C:N/I:N/A:P |