Lucene search

K
cveMitreCVE-2021-45485
HistoryDec 25, 2021 - 2:15 a.m.

CVE-2021-45485

2021-12-2502:15:06
CWE-327
mitre
web.nvd.nist.gov
258
linux kernel
ipv6
information leak
cve-2021-45485
nvd
hash table
security bug

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

41.1%

In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn’t properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.

Affected configurations

Nvd
Node
linuxlinux_kernelRange<5.13.3
Node
netappe-series_santricity_os_controllerMatch-
OR
netappsolidfire\,_enterprise_sds_\&_hci_storage_nodeMatch-
OR
netappsolidfire_\&_hci_management_nodeMatch-
OR
netappbrocade_fabric_operating_system_firmwareMatch-
Node
oraclecommunications_cloud_native_core_binding_support_functionMatch22.1.3
OR
oraclecommunications_cloud_native_core_network_exposure_functionMatch22.1.1
OR
oraclecommunications_cloud_native_core_policyMatch22.2.0
Node
netappall_flash_fabric-attached_storage_8300_firmwareMatch-
AND
netappall_flash_fabric-attached_storage_8300Match-
Node
netappfabric-attached_storage_8300_firmwareMatch-
AND
netappfabric-attached_storage_8300Match-
Node
netappall_flash_fabric-attached_storage_8700_firmwareMatch-
AND
netappall_flash_fabric-attached_storage_8700Match-
Node
netappfabric-attached_storage_8700_firmwareMatch-
AND
netappfabric-attached_storage_8700Match-
Node
netappaff_a400_firmwareMatch-
AND
netappaff_a400Match-
Node
netappfabric-attached_storage_a400_firmwareMatch-
AND
netappfabric-attached_storage_a400Match-
Node
netapphci_compute_node_firmwareMatch-
AND
netapphci_compute_nodeMatch-
Node
netapph300e_firmwareMatch-
AND
netapph300eMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
netapph410c_firmwareMatch-
AND
netapph410cMatch-
Node
netapph410s_firmwareMatch-
AND
netapph410sMatch-
Node
netapph500e_firmwareMatch-
AND
netapph500eMatch-
Node
netapph500s_firmwareMatch-
AND
netapph500sMatch-
Node
netapph610c_firmwareMatch-
AND
netapph610cMatch-
Node
netapph610s_firmwareMatch-
AND
netapph610sMatch-
Node
netapph615c_firmwareMatch-
AND
netapph615cMatch-
Node
netapph700e_firmwareMatch-
AND
netapph700eMatch-
Node
netapph700s_firmwareMatch-
AND
netapph700sMatch-
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
netappe-series_santricity_os_controller-cpe:2.3:a:netapp:e-series_santricity_os_controller:-:*:*:*:*:*:*:*
netappsolidfire\,_enterprise_sds_\&_hci_storage_node-cpe:2.3:a:netapp:solidfire\,_enterprise_sds_\&_hci_storage_node:-:*:*:*:*:*:*:*
netappsolidfire_\&_hci_management_node-cpe:2.3:a:netapp:solidfire_\&_hci_management_node:-:*:*:*:*:*:*:*
netappbrocade_fabric_operating_system_firmware-cpe:2.3:o:netapp:brocade_fabric_operating_system_firmware:-:*:*:*:*:*:*:*
oraclecommunications_cloud_native_core_binding_support_function22.1.3cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*
oraclecommunications_cloud_native_core_network_exposure_function22.1.1cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*
oraclecommunications_cloud_native_core_policy22.2.0cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*
netappall_flash_fabric-attached_storage_8300_firmware-cpe:2.3:o:netapp:all_flash_fabric-attached_storage_8300_firmware:-:*:*:*:*:*:*:*
netappall_flash_fabric-attached_storage_8300-cpe:2.3:h:netapp:all_flash_fabric-attached_storage_8300:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 441

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

41.1%