PT-2026-26050 · Linux · Linux Kernel

Zhouyan Deng

·

Published

2026-01-01

·

Updated

2026-04-20

·

CVE-2026-23247

CVSS v2.0

4.6

Medium

VectorAV:L/AC:L/Au:S/C:N/I:N/A:C
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description The Linux kernel addresses an issue where off-path TCP source port leakage could occur via a SYN cookie side-channel. The resolution involves reintroducing TCP ports into the timestamp offset randomization process, effectively reverting a previous change. This is achieved through a single siphash() computation to generate both an Initial Sequence Number (ISN) and a timestamp offset. The issue was reported by Zhouyan Deng.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Use of Insufficiently Random Values

Weakness Enumeration

Related Identifiers

BDU:2026-04643
CVE-2026-23247
OESA-2026-1946
OESA-2026-1947
OESA-2026-1948

Affected Products

Linux Kernel