First published: Fri Jul 05 2019(Updated: )
A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe a weak IP ID generation in this field to track Linux devices.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1127.rt56.1093.el7 | 0:3.10.0-1127.rt56.1093.el7 |
redhat/kernel | <0:3.10.0-1127.el7 | 0:3.10.0-1127.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
IBM Data Risk Manager | <=2.0.6 | |
Linux Kernel | <5.1.7 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10638 is categorized as a medium severity vulnerability affecting the Linux kernel.
To fix CVE-2019-10638, update the Linux kernel to version 5.1.7 or later, or apply the relevant patches provided by your Linux distribution.
CVE-2019-10638 affects versions of the Linux kernel prior to 5.1.7 and specific Red Hat and IBM products listed in the vulnerability details.
CVE-2019-10638 is a tracking vulnerability that allows remote users to observe weak IP ID generation, potentially compromising device privacy.
Yes, CVE-2019-10638 can be exploited by remote users to observe and track Linux devices.