An information leak problem could be observed in ip_rt_init in net/ipv4/route.c in the IPv4 implementation. In this flaw, using a small hash table in IP ID generation could be abused by a patient remote attacker to reveal sensitive information. Reference and upstream patch: https://arxiv.org/pdf/2112.09604.pdf https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2039915]
This was fixed for Fedora with the 5.12.4 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1975 https://access.redhat.com/errata/RHSA-2022:1975
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1988 https://access.redhat.com/errata/RHSA-2022:1988
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-45486
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:6991 https://access.redhat.com/errata/RHSA-2022:6991
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:6983 https://access.redhat.com/errata/RHSA-2022:6983