Use of Insufficiently Random Values Affecting torvalds/linux package, versions [,5.15-rc1)


0.0
high

Snyk CVSS

    Attack Complexity High
    Confidentiality High
    Integrity High

    Threat Intelligence

    EPSS 0.27% (68th percentile)
Expand this section
NVD
7.4 high
Expand this section
SUSE
7.4 high
Expand this section
Red Hat
7.4 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UNMANAGED-TORVALDSLINUX-2932171
  • published 20 Jun 2022
  • disclosed 20 Jun 2022
  • credit Unknown

How to fix?

Upgrade torvalds/linux to version 5.15-rc1 or higher.

Overview

Affected versions of this package are vulnerable to Use of Insufficiently Random Values due to a flaw in the processing of received ICMP errors. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization.