The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3065-1 | linux security update |
Debian DSA |
DSA-5173-1 | linux security update |
EUVD |
EUVD-2022-53489 | The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. |
Ubuntu USN |
USN-5616-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-5622-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5623-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-5630-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-5639-1 | Linux kernel (Azure CVM) vulnerabilities |
Ubuntu USN |
USN-5647-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-5654-1 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-5660-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-5669-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5669-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5678-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5679-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-5684-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5687-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5695-1 | Linux kernel (GCP) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T07:39:50.938Z
Reserved: 2022-06-05T00:00:00
Link: CVE-2022-32296
No data.
Status : Modified
Published: 2022-06-05T22:15:08.797
Modified: 2024-11-21T07:06:07.740
Link: CVE-2022-32296
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN