An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.
References
Link | Resource |
---|---|
https://dl.acm.org/doi/10.1145/3372297.3417884 | Technical Description Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220331-0003/ | Third Party Advisory |
https://dl.acm.org/doi/10.1145/3372297.3417884 | Technical Description Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220331-0003/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
History
21 Nov 2024, 05:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://dl.acm.org/doi/10.1145/3372297.3417884 - Technical Description, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20220331-0003/ - Third Party Advisory |
09 Nov 2023, 14:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netapp h700s
Netapp h410s Firmware Netapp h500s Firmware Netapp h610c Firmware Netapp h700e Firmware Netapp h300e Firmware Netapp h700e Netapp h615c Netapp h410c Netapp h610s Firmware Netapp h610s Netapp h300s Firmware Netapp h615c Firmware Netapp h500e Firmware Netapp h410s Netapp h700s Firmware Netapp h300e Netapp h500e Netapp h500s Netapp h610c Netapp h300s Netapp h410c Firmware |
|
CPE | cpe:2.3:o:netapp:baseboard_management_controller_h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h700e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h300e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h500s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h610c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h300e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h615c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h500e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:baseboard_management_controller_h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h500e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h410s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h610s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:baseboard_management_controller_h615c:-:*:*:*:*:*:*:* |
cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* |
Information
Published : 2022-02-26 04:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36516
Mitre link : CVE-2020-36516
CVE.ORG link : CVE-2020-36516
JSON object : View
Products Affected
netapp
- h610s
- h700e_firmware
- h500s_firmware
- h410c_firmware
- h500s
- h700s
- h615c
- solidfire\,_enterprise_sds_\&_hci_storage_node
- h500e_firmware
- h410c
- solidfire_\&_hci_management_node
- e-series_santricity_os_controller
- h410s_firmware
- h700e
- cloud_volumes_ontap_mediator
- h700s_firmware
- h300s
- h300e_firmware
- h610c_firmware
- h610s_firmware
- h500e
- bootstrap_os
- hci_compute_node
- h610c
- h615c_firmware
- h300s_firmware
- h410s
- h300e
linux
- linux_kernel
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm