CWE
330 200
Advisory Published
Updated

CVE-2019-18282: Infoleak

First published: Tue Oct 22 2019(Updated: )

A device tracking vulnerability was found in the flow_dissector feature in the Linux kernel. This flaw occurs because the auto flowlabel of the UDP IPv6 packet relies on a 32-bit hashmd value as a secret, and jhash (instead of siphash) is used. The hashmd value remains the same starting from boot time and can be inferred by an attacker.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
redhat/kernel-rt<0:3.10.0-1160.11.1.rt56.1145.el7
0:3.10.0-1160.11.1.rt56.1145.el7
redhat/kernel<0:3.10.0-1160.11.1.el7
0:3.10.0-1160.11.1.el7
redhat/kernel-rt<0:4.18.0-193.rt13.51.el8
0:4.18.0-193.rt13.51.el8
redhat/kernel<0:4.18.0-193.el8
0:4.18.0-193.el8
Google Android
Linux Linux kernel>=4.3<=5.3.10
Debian Debian Linux=8.0
Netapp A700s Firmware
Netapp A700s
Netapp 8300 Firmware
Netapp 8300
Netapp 8700 Firmware
Netapp 8700
Netapp A400 Firmware
Netapp A400
Netapp H610s Firmware
Netapp H610s
Netapp Active Iq Unified Manager Vmware Vsphere
Netapp Cloud Backup
Netapp Data Availability Services
NetApp E-Series SANtricity OS Controller>=11.0.0<=11.70.1
Netapp Hci Management Node
Netapp Solidfire
Netapp Steelstore Cloud Integrated Storage

Remedy

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2019-18282?

    CVE-2019-18282 is a device tracking vulnerability found in the flow_dissector feature in the Linux kernel.

  • What is the severity of CVE-2019-18282?

    The severity of CVE-2019-18282 is high with a CVSS score of 5.3.

  • How does CVE-2019-18282 occur?

    CVE-2019-18282 occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used.

  • Which versions of the Linux kernel are affected by CVE-2019-18282?

    The Linux kernel versions 4.3 through 5.x before 5.3.10 are affected by CVE-2019-18282.

  • Are there any remedies available for CVE-2019-18282?

    Yes, there are remedies available for CVE-2019-18282. Please refer to the provided references for more information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203