Lucene search

K
nvd[email protected]NVD:CVE-2021-45485
HistoryDec 25, 2021 - 2:15 a.m.

CVE-2021-45485

2021-12-2502:15:06
CWE-327
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

34.4%

In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn’t properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.

Affected configurations

NVD
Node
linuxlinux_kernelRange<5.13.3
Node
netappe-series_santricity_os_controllerMatch-
OR
netappsolidfire\,_enterprise_sds_\&_hci_storage_nodeMatch-
OR
netappsolidfire_\&_hci_management_nodeMatch-
OR
netappbrocade_fabric_operating_system_firmwareMatch-
Node
oraclecommunications_cloud_native_core_binding_support_functionMatch22.1.3
OR
oraclecommunications_cloud_native_core_network_exposure_functionMatch22.1.1
OR
oraclecommunications_cloud_native_core_policyMatch22.2.0
Node
netappall_flash_fabric-attached_storage_8300_firmwareMatch-
AND
netappall_flash_fabric-attached_storage_8300Match-
Node
netappfabric-attached_storage_8300_firmwareMatch-
AND
netappfabric-attached_storage_8300Match-
Node
netappall_flash_fabric-attached_storage_8700_firmwareMatch-
AND
netappall_flash_fabric-attached_storage_8700Match-
Node
netappfabric-attached_storage_8700_firmwareMatch-
AND
netappfabric-attached_storage_8700Match-
Node
netappaff_a400_firmwareMatch-
AND
netappaff_a400Match-
Node
netappfabric-attached_storage_a400_firmwareMatch-
AND
netappfabric-attached_storage_a400Match-
Node
netapphci_compute_node_firmwareMatch-
AND
netapphci_compute_nodeMatch-
Node
netapph300e_firmwareMatch-
AND
netapph300eMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
netapph410c_firmwareMatch-
AND
netapph410cMatch-
Node
netapph410s_firmwareMatch-
AND
netapph410sMatch-
Node
netapph500e_firmwareMatch-
AND
netapph500eMatch-
Node
netapph500s_firmwareMatch-
AND
netapph500sMatch-
Node
netapph610c_firmwareMatch-
AND
netapph610cMatch-
Node
netapph610s_firmwareMatch-
AND
netapph610sMatch-
Node
netapph615c_firmwareMatch-
AND
netapph615cMatch-
Node
netapph700e_firmwareMatch-
AND
netapph700eMatch-
Node
netapph700s_firmwareMatch-
AND
netapph700sMatch-

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

34.4%