In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
References
| Link | Resource |
|---|---|
| https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 | Release Notes Vendor Advisory |
| https://arxiv.org/pdf/2112.09604.pdf | Technical Description Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99 | Patch Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20220121-0001/ | Third Party Advisory |
| https://www.oracle.com/security-alerts/cpujul2022.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2021-12-25 02:15
Updated : 2022-07-25 18:18
NVD link : CVE-2021-45485
Mitre link : CVE-2021-45485
JSON object : View
Products Affected
netapp
- baseboard_management_controller_h615c
- fas\/aff_baseboard_management_controller_8700
- baseboard_management_controller_h500s
- baseboard_management_controller_h610c
- baseboard_management_controller_h410c
- baseboard_management_controller_h300s
- hci_compute_node
- baseboard_management_controller_h500e
- baseboard_management_controller_h300e
- e-series_santricity_os_controller
- fas\/aff_baseboard_management_controller_8300
- brocade_fabric_operating_system_firmware
- baseboard_management_controller_h700e
- baseboard_management_controller_h410s
- solidfire\,_enterprise_sds_\&_hci_storage_node
- fas\/aff_baseboard_management_controller_a400
- baseboard_management_controller_h610s
- solidfire_\&_hci_management_node
- baseboard_management_controller_h700s
linux
- linux_kernel
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
