mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 22:53:11 +00:00
27 lines
1.2 KiB
Markdown
27 lines
1.2 KiB
Markdown
### [CVE-2021-45485](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
|
|
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99
|
|
- https://www.oracle.com/security-alerts/cpujul2022.html
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
|
- https://github.com/SYRTI/POC_to_review
|
|
- https://github.com/Satheesh575555/linux-4.19.72_CVE-2021-45485
|
|
- https://github.com/WhooAmii/POC_to_review
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/trhacknon/Pocingit
|
|
- https://github.com/zecool/cve
|
|
|