Логотип exploitDog
bind:"BDU:2019-02915" OR bind:"CVE-2019-10638"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2019-02915" OR bind:"CVE-2019-10638"

Количество 22

Количество 22

fstec логотип

BDU:2019-02915

больше 6 лет назад

Уязвимость хеш-функции «jhash» ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2019-10638

около 6 лет назад

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-10638

около 6 лет назад

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2019-10638

около 6 лет назад

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2019-10638

около 1 года назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-10638

около 6 лет назад

In the Linux kernel before 5.1.7, a device can be tracked by an attack ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-wr6f-49rm-hx88

больше 3 лет назад

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1854-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1716-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5837

около 5 лет назад

ELSA-2020-5837: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1757-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1852-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1851-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1829-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1823-2

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1823-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1855-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2069-1

около 6 лет назад

Security update for the Linux Kernel for Azure

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1016

больше 5 лет назад

ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2450-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-02915

Уязвимость хеш-функции «jhash» ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 6.5
1%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2019-10638

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVSS3: 6.5
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-10638

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVSS3: 3.7
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-10638

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVSS3: 6.5
1%
Низкий
около 6 лет назад
msrc логотип
CVSS3: 6.5
1%
Низкий
около 1 года назад
debian логотип
CVE-2019-10638

In the Linux kernel before 5.1.7, a device can be tracked by an attack ...

CVSS3: 6.5
1%
Низкий
около 6 лет назад
github логотип
GHSA-wr6f-49rm-hx88

In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

1%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2019:1854-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1716-1

Security update for the Linux Kernel

около 6 лет назад
oracle-oval логотип
ELSA-2020-5837

ELSA-2020-5837: Unbreakable Enterprise kernel security update (IMPORTANT)

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1757-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1852-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1851-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1829-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1823-2

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1823-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1855-1

Security update for the Linux Kernel

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2069-1

Security update for the Linux Kernel for Azure

около 6 лет назад
oracle-oval логотип
ELSA-2020-1016

ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2450-1

Security update for the Linux Kernel

около 6 лет назад

Уязвимостей на страницу