In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.13.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "22.1.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "22.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "22.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.13.3"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-45485.json"