CVE-2021-23270

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-23270
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23270.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-23270
Published
2021-04-12T19:15:14.517Z
Modified
2025-11-20T11:35:44.461913Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In Gargoyle OS 1.12.0, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.

References

Affected packages

Git / github.com/ericpaulbishop/gargoyle

Affected ranges

Type
GIT
Repo
https://github.com/ericpaulbishop/gargoyle
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.10.0
1.11.0
1.12.0
1.3.0
1.3.1
1.3.10
1.3.11
1.3.12
1.3.13
1.3.14
1.3.15
1.3.16
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.3.9
1.4.0
1.4.1
1.4.2
1.5.0
1.5.1
1.5.10
1.5.11
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
1.5.7
1.5.8
1.5.9
1.6.0
1.6.1
1.6.2
1.7.0
1.7.1
1.7.2
1.8.0
1.9.0
1.9.1
1.9.2

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23270.json"