The flow_dissector feature in the Linux kernel 4.3 up to and including 5.x prior to 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
debian debian linux 8.0 |
||
netapp a700s_firmware - |
||
netapp 8300_firmware - |
||
netapp 8700_firmware - |
||
netapp a400_firmware - |
||
netapp h610s_firmware - |
||
netapp active iq unified manager - |
||
netapp cloud backup - |
||
netapp data availability services - |
||
netapp e-series santricity os controller |
||
netapp hci management node - |
||
netapp solidfire - |
||
netapp steelstore cloud integrated storage - |