PT-2026-26050 · Linux · Linux Kernel
Zhouyan Deng
·
Published
2026-01-01
·
Updated
2026-04-20
·
CVE-2026-23247
CVSS v2.0
4.6
Medium
| Vector | AV:L/AC:L/Au:S/C:N/I:N/A:C |
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
The Linux kernel addresses an issue where off-path TCP source port leakage could occur via a SYN cookie side-channel. The resolution involves reintroducing TCP ports into the timestamp offset randomization process, effectively reverting a previous change. This is achieved through a single siphash() computation to generate both an Initial Sequence Number (ISN) and a timestamp offset. The issue was reported by Zhouyan Deng.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Use of Insufficiently Random Values
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Linux Kernel