First published: Mon May 31 2021(Updated: )
An information leak flaw was found in the Linux kernel’s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-372.9.1.rt7.166.el8 | 0:4.18.0-372.9.1.rt7.166.el8 |
redhat/kernel | <0:4.18.0-372.9.1.el8 | 0:4.18.0-372.9.1.el8 |
redhat/kernel-rt | <0:4.18.0-305.65.1.rt7.137.el8_4 | 0:4.18.0-305.65.1.rt7.137.el8_4 |
redhat/kernel | <0:4.18.0-305.65.1.el8_4 | 0:4.18.0-305.65.1.el8_4 |
redhat/kernel | <5.14 | 5.14 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Linux Kernel | <5.13.3 | |
NetApp E-Series SANtricity OS Controller | ||
netapp solidfire\, enterprise sds \& hci storage node | ||
netapp solidfire \& hci management node | ||
Brocade Fabric OS | ||
oracle communications Cloud native core binding support function | =22.1.3 | |
oracle communications cloud native core network exposure function | =22.1.1 | |
oracle communications Cloud native core policy | =22.2.0 | |
NetApp All Flash Fabric-Attached Storage 8300 Firmware | ||
NetApp All Flash Fabric-Attached Storage 8300 Firmware | ||
NetApp Fabric-Attached Storage 8300 Firmware | ||
NetApp All Flash Fabric-Attached Storage 8300 | ||
NetApp All Flash Fabric-Attached Storage 8700 Firmware | ||
NetApp Fabric-Attached Storage 8700 | ||
NetApp All Flash Fabric-Attached Storage 8700 Firmware | ||
NetApp Fabric-Attached Storage 8700 | ||
NetApp AFF A400 | ||
NetApp AFF A400 | ||
netapp fabric-attached storage a400 firmware | ||
netapp fabric-attached storage a400 | ||
netapp hci compute node firmware | ||
netapp hci compute node | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h300s firmware | ||
netapp h300s | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h500e firmware | ||
netapp h500e | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h610c firmware | ||
netapp h610c | ||
netapp h610s firmware | ||
netapp h610s | ||
netapp h615c firmware | ||
netapp h615c | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
NetApp All Flash Fabric-Attached Storage 8300 Firmware | ||
NetApp All Flash Fabric-Attached Storage 8300 Firmware | ||
All of | ||
NetApp Fabric-Attached Storage 8300 Firmware | ||
NetApp All Flash Fabric-Attached Storage 8300 | ||
All of | ||
NetApp All Flash Fabric-Attached Storage 8700 Firmware | ||
NetApp Fabric-Attached Storage 8700 | ||
All of | ||
NetApp All Flash Fabric-Attached Storage 8700 Firmware | ||
NetApp Fabric-Attached Storage 8700 | ||
All of | ||
NetApp AFF A400 | ||
NetApp AFF A400 | ||
All of | ||
netapp fabric-attached storage a400 firmware | ||
netapp fabric-attached storage a400 | ||
All of | ||
netapp hci compute node firmware | ||
netapp hci compute node | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h610c firmware | ||
netapp h610c | ||
All of | ||
netapp h610s firmware | ||
netapp h610s | ||
All of | ||
netapp h615c firmware | ||
netapp h615c | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h700s firmware | ||
netapp h700s |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-45485 is classified as a medium severity information leak vulnerability in the Linux kernel.
To fix CVE-2021-45485, update to the latest kernel versions specified in the advisory, such as kernel version 5.14 or specific Red Hat versions.
Affected versions include the Linux kernel prior to 5.14 and specific earlier Red Hat kernel packages.
CVE-2021-45485 allows remote attackers to potentially reveal sensitive information from the system due to flawed IPv6 implementation.
CVE-2021-45485 requires a remote attacker to send crafted IPv6 packets, making it a moderate risk for exposure.