Количество 22
Количество 22

CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

CVE-2019-10638
CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attack ...
GHSA-wr6f-49rm-hx88
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.

BDU:2019-02915
Уязвимость хеш-функции «jhash» ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию

SUSE-SU-2019:1854-1
Security update for the Linux Kernel

openSUSE-SU-2019:1716-1
Security update for the Linux Kernel
ELSA-2020-5837
ELSA-2020-5837: Unbreakable Enterprise kernel security update (IMPORTANT)

openSUSE-SU-2019:1757-1
Security update for the Linux Kernel

SUSE-SU-2019:1852-1
Security update for the Linux Kernel

SUSE-SU-2019:1851-1
Security update for the Linux Kernel

SUSE-SU-2019:1829-1
Security update for the Linux Kernel

SUSE-SU-2019:1823-2
Security update for the Linux Kernel

SUSE-SU-2019:1823-1
Security update for the Linux Kernel

SUSE-SU-2019:1855-1
Security update for the Linux Kernel

SUSE-SU-2019:2069-1
Security update for the Linux Kernel for Azure
ELSA-2020-1016
ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE)

SUSE-SU-2019:2450-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-10638 In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. | CVSS3: 6.5 | 1% Низкий | почти 6 лет назад |
![]() | CVE-2019-10638 In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. | CVSS3: 3.7 | 1% Низкий | почти 6 лет назад |
![]() | CVE-2019-10638 In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. | CVSS3: 6.5 | 1% Низкий | почти 6 лет назад |
![]() | CVSS3: 6.5 | 1% Низкий | 10 месяцев назад | |
CVE-2019-10638 In the Linux kernel before 5.1.7, a device can be tracked by an attack ... | CVSS3: 6.5 | 1% Низкий | почти 6 лет назад | |
GHSA-wr6f-49rm-hx88 In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. | 1% Низкий | около 3 лет назад | ||
![]() | BDU:2019-02915 Уязвимость хеш-функции «jhash» ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 6.5 | 1% Низкий | около 6 лет назад |
![]() | SUSE-SU-2019:1854-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | openSUSE-SU-2019:1716-1 Security update for the Linux Kernel | почти 6 лет назад | ||
ELSA-2020-5837 ELSA-2020-5837: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 5 лет назад | |||
![]() | openSUSE-SU-2019:1757-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1852-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1851-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1829-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1823-2 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1823-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1855-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2069-1 Security update for the Linux Kernel for Azure | почти 6 лет назад | ||
ELSA-2020-1016 ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE) | около 5 лет назад | |||
![]() | SUSE-SU-2019:2450-1 Security update for the Linux Kernel | больше 5 лет назад |
Уязвимостей на страницу