4.3
CVSSv2

CVE-2019-10638

Published: 05/07/2019 Updated: 14/06/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

In the Linux kernel prior to 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2015-8553 Jan Beulich discovered that CVE-2015-2150 was not completely addressed If a PCI physical function is passed through to a Xen guest, the guest is able to access its memory and I ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2018-20836 chenxiang reported a race condition in libsas, the kernel subsystem supporting Serial Attached SCSI (SAS) devices, which could lead to a use-after-free It is not clear how thi ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Impact: Moderate Public Date: 2019-07-15 CWE: CWE-331 Bugzilla: 1729931: CVE-2019-10638 kernel: weak IP ...

References

CWE-326https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8https://github.com/torvalds/linux/commit/55f0fc7a02de8f12757f4937143d8d5091b2e40bhttps://arxiv.org/pdf/1906.10478.pdfhttps://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92https://github.com/torvalds/linux/commit/df453700e8d81b1bdafdf684365ee2b9431fb702https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df453700e8d81b1bdafdf684365ee2b9431fb702http://www.securityfocus.com/bid/109092http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.htmlhttps://security.netapp.com/advisory/ntap-20190806-0001/https://www.debian.org/security/2019/dsa-4495https://seclists.org/bugtraq/2019/Aug/13https://www.debian.org/security/2019/dsa-4497https://seclists.org/bugtraq/2019/Aug/18https://lists.debian.org/debian-lts-announce/2019/08/msg00016.htmlhttps://lists.debian.org/debian-lts-announce/2019/08/msg00017.htmlhttps://usn.ubuntu.com/4114-1/https://usn.ubuntu.com/4117-1/https://usn.ubuntu.com/4116-1/https://usn.ubuntu.com/4115-1/https://usn.ubuntu.com/4118-1/https://access.redhat.com/errata/RHSA-2019:3309https://access.redhat.com/errata/RHSA-2019:3517https://seclists.org/bugtraq/2019/Nov/11http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlhttps://www.oracle.com/security-alerts/cpuApr2021.htmlhttps://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2019:3517https://usn.ubuntu.com/4116-1/https://www.debian.org/security/2019/dsa-4497