A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2843-1 | linux security update |
Debian DLA |
DLA-2941-1 | linux-4.19 security update |
Debian DSA |
DSA-5096-1 | linux security update |
EUVD |
EUVD-2021-7746 | A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well. |
Ubuntu USN |
USN-5268-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:37:23.666Z
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20322
No data.
Status : Modified
Published: 2022-02-18T18:15:09.013
Modified: 2024-11-21T05:46:22.573
Link: CVE-2021-20322
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN