First published: Sat Dec 25 2021(Updated: )
In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | <=9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45484 is a vulnerability in NetBSD through version 9.2 where the IPv6 fragment ID generation algorithm uses a weak cryptographic PRNG.
CVE-2021-45484 has a severity level of 7.5 (high).
NetBSD versions up to and including 9.2 are affected by CVE-2021-45484.
To fix CVE-2021-45484, it is recommended to update NetBSD to a version beyond 9.2 that addresses the vulnerability.
More information about CVE-2021-45484 can be found in the NetBSD security advisory (NetBSD-SA2021-001.txt.asc) and the research paper (arxiv.org/pdf/2112.09604.pdf).