Vulnerability Name:

CVE-2022-1678 (CCN-227319)

Assigned:2021-12-10
Published:2021-12-10
Updated:2022-10-27
Summary:An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-1678

Source: MISC
Type: Third Party Advisory
https://anas.openanolis.cn/cves/detail/CVE-2022-1678

Source: MISC
Type: Third Party Advisory
https://anas.openanolis.cn/errata/detail/ANSA-2022:0143

Source: CCN
Type: Bugzilla - Bug 61
TCP sock leaks with BBR internal pacing

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://bugzilla.openanolis.cn/show_bug.cgi?id=61

Source: XF
Type: UNKNOWN
linux-kernel-cve20221678-dos(227319)

Source: MISC
Type: Permissions Required
https://gitee.com/anolis/cloud-kernel/commit/bed537da691b

Source: CCN
Type: Linux Kernel GIT Repository
tcp: fix possible socket leaks in internal pacing mode

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a

Source: MISC
Type: Exploit, Patch, Vendor Advisory
https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing@gmail.com/

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20220715-0001/

Source: CCN
Type: Mend Vulnerability Database
CVE-2022-1678

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 4.18 and <= 4.19)

  • Configuration 2:
  • cpe:/a:netapp:element_software:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:storagegrid:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:solidfire:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:hci_management_node:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
  • OR cpe:/a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*
  • OR cpe:/a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* (Version >= 11.0 and <= 11.70.2)

  • Configuration 3:
  • cpe:/o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h300s:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h500s:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h700s:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h300e:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h500e:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h700e:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h410s:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:netapp:h410c:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:4.18:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:4.19:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    linux linux kernel *
    netapp element software -
    netapp storagegrid -
    netapp solidfire -
    netapp hci management node -
    netapp active iq unified manager -
    netapp cloud volumes ontap mediator -
    netapp e-series santricity os controller *
    netapp bootstrap os -
    netapp hci compute node -
    netapp h300s firmware -
    netapp h300s -
    netapp h500s firmware -
    netapp h500s -
    netapp h700s firmware -
    netapp h700s -
    netapp h300e firmware -
    netapp h300e -
    netapp h500e firmware -
    netapp h500e -
    netapp h700e firmware -
    netapp h700e -
    netapp h410s firmware -
    netapp h410s -
    netapp h410c firmware -
    netapp h410c -
    linux linux kernel 4.18
    linux linux kernel 4.19