Lucene search

K
redhatcveRedhat.comRH:CVE-2022-1012
HistoryMay 10, 2022 - 12:29 p.m.

CVE-2022-1012

2022-05-1012:29:51
redhat.com
access.redhat.com
155

0.001 Low

EPSS

Percentile

46.4%

The Linux kernel’s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts. An attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.

Mitigation

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.