First published: Mon Jun 28 2021(Updated: )
A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
redhat/kernel | <5.5 | 5.5 |
Linux Kernel | <5.5 | |
Linux Kernel | =5.5-rc1 | |
Linux Kernel | =5.5-rc2 | |
Linux Kernel | =5.5-rc3 | |
Linux Kernel | =5.5-rc4 | |
Linux Kernel | =5.5-rc5 | |
Linux Kernel | =5.5-rc6 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =34 |
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3635 has a severity rating that makes it critical due to its ability to allow system panic by users with root access.
To fix CVE-2021-3635, upgrade to kernel version 5.5 or later or apply the recommended updates for kernel versions 4.18.0-348.el8 and 4.18.0-348.rt7.130.el8.
CVE-2021-3635 affects Linux kernel versions prior to 5.5-rc7, particularly those with netfilter implemented.
The vulnerability can be triggered by issuing netfilter netflow commands by users with root (CAP_SYS_ADMIN) access.
No, while Red Hat products are affected, CVE-2021-3635 impacts all distributions using vulnerable Linux kernel versions prior to 5.5-rc7.