← Back to CVEs
CVE-2021-22555
HIGHCISA KEV8.3
Description
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
CVE Details
CVSS v3.1 Score8.3
SeverityHIGH
CVSS VectorCVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack VectorADJACENT_NETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published7/7/2021
Last Modified10/27/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorLinux
ProductKernel
Vulnerability NameLinux Kernel Heap Out-of-Bounds Write Vulnerability
KEV Date Added2025-10-06
Remediation Due Date2025-10-27
Ransomware UseUnknown
Affected Products
brocade:fabric_operating_systemlinux:linux_kernelnetapp:aff_500fnetapp:aff_500f_firmwarenetapp:aff_a250netapp:aff_a250_firmwarenetapp:aff_a400netapp:aff_a400_firmwarenetapp:c250netapp:c250_firmwarenetapp:c400netapp:c400_firmwarenetapp:cloud_backupnetapp:fas_8300netapp:fas_8300_firmwarenetapp:fas_8700netapp:fas_8700_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h610cnetapp:h610c_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:h615cnetapp:h615c_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_management_nodenetapp:solidfirenetapp:solidfire_baseboard_management_controller
Weaknesses (CWE)
CWE-787CWE-787
References
http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html(cve-coordination@google.com)
http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html(cve-coordination@google.com)
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html(cve-coordination@google.com)
http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html(cve-coordination@google.com)
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html(cve-coordination@google.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21(cve-coordination@google.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d(cve-coordination@google.com)
https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528(cve-coordination@google.com)
https://security.netapp.com/advisory/ntap-20210805-0010/(cve-coordination@google.com)
http://packetstormsecurity.com/files/163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/163878/Kernel-Live-Patch-Security-Notice-LSN-0080-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/164155/Kernel-Live-Patch-Security-Notice-LSN-0081-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/164437/Netfilter-x_tables-Heap-Out-Of-Bounds-Write-Privilege-Escalation.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa21(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210805-0010/(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22555(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.