Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-27854

Опубликовано: 27 сент. 2021
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers and Ethernet to Wifi frame translation.

Отчет

Red Hat deems this to be a configuration issue. There is no vulnerability in the Linux kernel itself, there is a lot of ways to misuse the filtering facilities provided by the kernel and do insecure filtering rules, but you also have everything to actually set up secure rules.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2010816kernel: layer 2 network filtering capabilities bypass / wifi

EPSS

Процентиль: 33%
0.00128
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
nvd
больше 3 лет назад

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.

CVSS3: 4.7
debian
больше 3 лет назад

Layer 2 network filtering capabilities such as IPv6 RA guard can be by ...

CVSS3: 4.7
github
больше 3 лет назад

Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.

EPSS

Процентиль: 33%
0.00128
Низкий

5.3 Medium

CVSS3