CVE-2019-18282Use of Insufficiently Random Values in Kernel

Severity
5.3MEDIUMNVD
EPSS
0.7%
top 28.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 16
Latest updateMay 24

Description

The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

Debianlinux/linux_kernel< 5.3.15-1+3
NVDlinux/linux_kernel4.35.3.10

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-gc9j-xjc6-h7v6: The flow_dissector feature in the Linux kernel 42022-05-24
OSV
CVE-2019-18282: In __flow_hash_from_keys of flow_dissector2020-07-01
CVEList
CVE-2019-18282: The flow_dissector feature in the Linux kernel 42020-01-16
OSV
CVE-2019-18282: The flow_dissector feature in the Linux kernel 42020-01-16

📋Vendor Advisories

3
Android
CVE-2019-18282: Linux Networking Stack2020-07-01
Red Hat
kernel: The flow_dissector feature allows device tracking2019-10-22
Debian
CVE-2019-18282: linux - The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has...2019

💬Community

3
Bugzilla
CVE-2019-18282 kernel: The flow_dissector feature allows device tracking2020-01-30
Bugzilla
CVE-2019-18282 kernel: The flow_dissector feature allows device tracking [fedora-all]2020-01-30
Bugzilla
CVE-2019-18282 kernel: flow_dissector allows device tracking [fedora-all]2020-01-30
CVE-2019-18282 — Use of Insufficiently Random Values | cvebase