Description
In the Linux kernel, the following vulnerability has been resolved:

tcp: secure_seq: add back ports to TS offset

This reverts 28ee1b746f49 ("secure_seq: downgrade to per-host timestamp offsets")

tcp_tw_recycle went away in 2017.

Zhouyan Deng reported off-path TCP source port leakage via
SYN cookie side-channel that can be fixed in multiple ways.

One of them is to bring back TCP ports in TS offset randomization.

As a bonus, we perform a single siphash() computation
to provide both an ISN and a TS offset.
Published: 2026-03-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Linux kernel change that reinstated TCP ports in the secure‑sequence calculation accidentally exposes the client’s source port to an off‑path observer. The commit revives state that was previously removed, and this reintroduction allows an attacker to perform a timing side‑channel on the SYN‑cookie response to deduce the original source port. The vulnerability does not lead to code execution or memory corruption; it simply leaks data. Based on the description, the likely attack vector involves an off‑path entity capable of measuring minute timing differences in SYN‑cookie responses. By comparing the response times of SYN packets with different source ports, the observer can infer the port values that were embedded in the timestamp offset. The impact of the disclosed source port is purely informational. Knowing the source port can aid in targeted network scans, bypass firewall rules that are port‑based, or facilitate further covert reconnaissance.

Affected Systems

The affected builds are Linux kernels that contain the commit which removed per‑host port data from secure‑sequence randomization and have not yet applied the revert that restores this data. In practice this includes kernel releases preceding the revert commit. The CPE list shows kernels ranging from 4.10.14 up to 7.0 rc2. Exact vulnerable versions cannot be listed precisely from the provided data, but the vulnerability is present in any kernel that lacks the revert.

Risk and Exploitability

The CVSS base score of 5.5 denotes a moderate severity, and the EPSS score of less than 1 % indicates a low overall probability of exploitation in the wild. The side‑channel requires an off‑path observer with precise timing capability, which limits the attack surface. The vulnerability is not listed in the CISA KEV catalog. Administrators should treat it as a moderate‑priority issue: update the kernel if possible, or otherwise employ the workaround to prevent the information leakage.

Generated by OpenCVE AI on May 21, 2026 at 20:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the revert commit restoring port data in secure_seq; use the newest kernel released by your distribution.
  • If an immediate kernel update is impractical, disable SYN‑cookies by setting net.ipv4.tcp_syncookies=0 in sysctl settings to eliminate the timing side‑channel.
  • For systems exposed to untrusted networks, limit inbound SYN traffic to required ports with firewall rules or tunnel traffic through a VPN to reduce side‑channel exposure.

Generated by OpenCVE AI on May 21, 2026 at 20:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:4.10.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-790

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-790

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200

Thu, 19 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 18 Mar 2026 10:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: tcp: secure_seq: add back ports to TS offset This reverts 28ee1b746f49 ("secure_seq: downgrade to per-host timestamp offsets") tcp_tw_recycle went away in 2017. Zhouyan Deng reported off-path TCP source port leakage via SYN cookie side-channel that can be fixed in multiple ways. One of them is to bring back TCP ports in TS offset randomization. As a bonus, we perform a single siphash() computation to provide both an ISN and a TS offset.
Title tcp: secure_seq: add back ports to TS offset
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:03:10.100Z

Reserved: 2026-01-13T15:37:45.989Z

Link: CVE-2026-23247

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T11:16:16.723

Modified: 2026-05-21T17:35:59.183

Link: CVE-2026-23247

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-23247 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T21:00:16Z

Weaknesses