CVE-2022-32296Use of Insufficiently Random Values in Kernel

Severity
3.3LOWNVD
OSV6.7OSV5.5OSV4.3
EPSS
0.1%
top 83.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 5
Latest updateJul 13

Description

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 1.8 | Impact: 1.4

Affected Packages6 packages

NVDlinux/linux_kernel< 5.17.9
Debianlinux/linux_kernel< 5.10.127-1+3
Ubuntulinux/linux_kernel< 4.15.0-194.205+1
debiandebian/linux< linux 5.17.11-1 (bookworm)

Patches

🔴Vulnerability Details

17
OSV
linux-gcp vulnerabilities2022-10-21
OSV
linux-azure-4.15 vulnerabilities2022-10-18
OSV
linux-azure vulnerabilities2022-10-17
OSV
linux-aws, linux-gcp-4.15 vulnerabilities2022-10-13
OSV
linux-aws-hwe vulnerabilities2022-10-13

📋Vendor Advisories

17
CISA ICS
​Siemens SIMATIC MV500 Devices2023-07-13
CISA ICS
Siemens SIMATIC S7-1500 TM MFP Linux Kernel2023-06-15
Ubuntu
Linux kernel (GCP) vulnerabilities2022-10-21
Ubuntu
Linux kernel (Azure) vulnerabilities2022-10-18
Ubuntu
Linux kernel (Azure) vulnerabilities2022-10-17