Description
A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2557-1 | linux-4.19 security update |
Debian DSA |
DSA-4843-1 | linux security update |
EUVD |
EUVD-2021-7634 | A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected. |
Ubuntu USN |
USN-4750-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:30:07.528Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20177
No data.
Status : Modified
Published: 2021-05-26T21:15:08.157
Modified: 2024-11-21T05:46:04.423
Link: CVE-2021-20177
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN