Linux Kernel Heap Out-of-Bounds Write Vulnerability (CVE-2021-22555)
Linux Kernel contains a heap out-of-bounds write vulnerability that could allow an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space.
An attacker, without authentication, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2025-10-27 under CISA BOD 22-01.
This is a Out-of-bounds Write (CWE-787) vulnerability in Linux Kernel. A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space Exploitation requires adjacent_network access, higher attack complexity, no authentication required, and no user interaction required.
Probably yes if any of these apply:
Active exploitation documented in the wild. Threat-research write-up: http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.