Vulnerability Name: | CVE-2022-1678 (CCN-227319) | ||||||||||||
Assigned: | 2021-12-10 | ||||||||||||
Published: | 2021-12-10 | ||||||||||||
Updated: | 2022-10-27 | ||||||||||||
Summary: | An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-1678 Source: MISC Type: Third Party Advisory https://anas.openanolis.cn/cves/detail/CVE-2022-1678 Source: MISC Type: Third Party Advisory https://anas.openanolis.cn/errata/detail/ANSA-2022:0143 Source: CCN Type: Bugzilla - Bug 61 TCP sock leaks with BBR internal pacing Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.openanolis.cn/show_bug.cgi?id=61 Source: XF Type: UNKNOWN linux-kernel-cve20221678-dos(227319) Source: MISC Type: Permissions Required https://gitee.com/anolis/cloud-kernel/commit/bed537da691b Source: CCN Type: Linux Kernel GIT Repository tcp: fix possible socket leaks in internal pacing mode Source: MISC Type: Patch, Third Party Advisory https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a Source: MISC Type: Exploit, Patch, Vendor Advisory https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing@gmail.com/ Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220715-0001/ Source: CCN Type: Mend Vulnerability Database CVE-2022-1678 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration 7: Configuration 8: Configuration 9: Configuration 10: Configuration 11: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |