Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: tcp: secure_seq: add back ports to TS offset This reverts 28ee1b746f49 ("secure_seq: downgrade to per-host timestamp offsets") tcp_tw_recycle went away in 2017. Zhouyan Deng reported off-path TCP source port leakage via SYN cookie side-channel that can be fixed in multiple ways. One of them is to bring back TCP ports in TS offset randomization. As a bonus, we perform a single siphash() computation to provide both an ISN and a TS offset.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.18.17 |
References
- https://git.kernel.org/stable/c/165573e41f2f66ef98940cf65f838b2cb575d9d1Patch
- https://git.kernel.org/stable/c/46e5b0d7cf55821527adea471ffe52a5afbd9cafPatch
- https://git.kernel.org/stable/c/eae2f14ab2efccdb7480fae7d42c4b0116ef8805Patch
FAQ
What is CVE-2026-23247?
CVE-2026-23247 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: tcp: secure_seq: add back ports to TS offset This reverts 28ee1b746f49 ("secure_seq: downgrade to per-host timestamp offsets") tc...
How severe is CVE-2026-23247?
CVE-2026-23247 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23247?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.