CVE-2021-28691
Summary
| CVE | CVE-2021-28691 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-29 12:15:00 UTC |
| Updated | 2022-04-06 16:46:00 UTC |
| Description | Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet. Such kernel thread termination will lead to a use-after-free in Linux netback when the backend is destroyed, as the kernel thread associated with queue 0 will have already exited and thus the call to kthread_stop will be performed against a stale pointer. |
NVD Known Affected Configurations (CPE 2.3)
Vendor Comments And Credit
Discovery Credit
LEGACY: Array
Legacy QID Mappings
- 180071 Debian Security Update for linux (CVE-2021-28691)
- 198436 Ubuntu Security Notification for Linux kernel (OEM) vulnerabilities (USN-5015-1) (Sequoia)
- 198465 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5046-1)
- 198468 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5050-1)
- 353158 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-002
- 710038 Gentoo Linux Xen Multiple vulnerabilities (GLSA 202107-30)
- 900084 CBL-Mariner Linux Security Update for kernel 5.10.52.1
- 900304 CBL-Mariner Linux Security Update for kernel 5.10.57.1
- 900319 CBL-Mariner Linux Security Update for kernel 5.10.60.1
- 900887 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6537-1)
- 903024 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (4375)
- 906029 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (4375-1)