Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1012

Опубликовано: 02 мая 2022
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

The Linux kernel's TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts. An attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.

Отчет

Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7. This flaw is ranked as a Moderate impact due to:

  • Limited exposure of the data in the TCP stack;
  • The impact of this vulnerability is limited to a system fingerprinting;
  • The requirements to carry the attack are elevated, requiring monitoring of the data flow.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2022:583402.08.2022
Red Hat Enterprise Linux 8kernelFixedRHSA-2022:581903.08.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionskernelFixedRHSA-2022:563619.07.2022
Red Hat Enterprise Linux 8.2 Extended Update Supportkernel-rtFixedRHSA-2022:522428.06.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportkernelFixedRHSA-2022:522028.06.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportkernel-rtFixedRHSA-2022:563319.07.2022
Red Hat Enterprise Linux 8.4 Extended Update SupportkernelFixedRHSA-2022:562619.07.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2064604kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak

EPSS

Процентиль: 60%
0.00407
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.2
ubuntu
почти 3 года назад

A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

CVSS3: 8.2
nvd
почти 3 года назад

A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.

CVSS3: 8.2
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 8.2
debian
почти 3 года назад

A memory leak problem was found in the TCP source port generation algo ...

CVSS3: 8.2
fstec
около 3 лет назад

Уязвимость рандомизированной генерации номеров исходящих TCP-портов ядра операционной системы Linux, позволяющая нарушителю предугадать номер порта исходящего TCP-соединения

EPSS

Процентиль: 60%
0.00407
Низкий

6.5 Medium

CVSS3