{"id":"CVE-2022-32296","details":"The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.","modified":"2026-03-15T22:45:13.998372Z","published":"2022-06-05T22:15:08.797Z","related":["SUSE-SU-2022:3693-1","SUSE-SU-2022:3704-1","SUSE-SU-2022:3809-1","SUSE-SU-2022:3844-1","SUSE-SU-2022:4617-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"},{"type":"WEB","url":"https://arxiv.org/abs/2209.12993"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5173"},{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9"},{"type":"FIX","url":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5"},{"type":"PACKAGE","url":"https://github.com/0xkol/rfc6056-device-tracker"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.17.9"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32296.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}]}