First published: Mon Mar 15 2021(Updated: )
A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <5.11.11 | |
Fedora | =32 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29646 is classified as a high severity vulnerability due to the potential for a local user to crash the system.
To fix CVE-2021-29646, update the kernel to a version that is patched, such as 0:4.18.0-348.rt7.130.el8 for kernel-rt or 0:4.18.0-348.el8 for kernel.
CVE-2021-29646 affects various Linux kernel versions prior to 5.11.11 and specific Fedora releases such as Fedora 32, 33, and 34.
CVE-2021-29646 cannot be exploited remotely as it requires local access to the system.
Exploiting CVE-2021-29646 can lead to a buffer overflow that crashes the affected system, resulting in denial of service.