Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-32296

Опубликовано: 05 июн. 2022
Источник: debian

Описание

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.17.11-1package
linuxfixed5.10.127-1bullseyepackage

Примечания

  • https://git.kernel.org/linus/4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5 (5.18-rc6)

Связанные уязвимости

CVSS3: 3.3
ubuntu
больше 3 лет назад

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

redhat
почти 4 года назад

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

CVSS3: 3.3
nvd
больше 3 лет назад

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

CVSS3: 3.3
msrc
больше 3 лет назад

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

CVSS3: 3.3
github
больше 3 лет назад

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used.