Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash).
{ "availability": "No subscription required", "binaries": [ { "binary_version": "5.14.0-1050.57", "binary_name": "linux-buildinfo-5.14.0-1050-oem" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-headers-5.14.0-1050-oem" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-image-unsigned-5.14.0-1050-oem" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-image-unsigned-5.14.0-1050-oem-dbgsym" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-modules-5.14.0-1050-oem" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-modules-iwlwifi-5.14.0-1050-oem" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-oem-5.14-headers-5.14.0-1050" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-oem-5.14-tools-5.14.0-1050" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-oem-5.14-tools-host" }, { "binary_version": "5.14.0-1050.57", "binary_name": "linux-tools-5.14.0-1050-oem" } ] }