Vulnerability Name: | CVE-2022-1678 (CCN-227319) |
Assigned: | 2021-12-10 |
Published: | 2021-12-10 |
Updated: | 2022-10-27 |
Summary: | An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
|
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2022-1678
Source: MISC Type: Third Party Advisory https://anas.openanolis.cn/cves/detail/CVE-2022-1678
Source: MISC Type: Third Party Advisory https://anas.openanolis.cn/errata/detail/ANSA-2022:0143
Source: CCN Type: Bugzilla - Bug 61 TCP sock leaks with BBR internal pacing
Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.openanolis.cn/show_bug.cgi?id=61
Source: XF Type: UNKNOWN linux-kernel-cve20221678-dos(227319)
Source: MISC Type: Permissions Required https://gitee.com/anolis/cloud-kernel/commit/bed537da691b
Source: CCN Type: Linux Kernel GIT Repository tcp: fix possible socket leaks in internal pacing mode
Source: MISC Type: Patch, Third Party Advisory https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a
Source: MISC Type: Exploit, Patch, Vendor Advisory https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing@gmail.com/
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220715-0001/
Source: CCN Type: Mend Vulnerability Database CVE-2022-1678
|
Vulnerable Configuration: | Configuration 1: cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version >= 4.18 and <= 4.19) Configuration 2: cpe:/a:netapp:element_software:-:*:*:*:*:*:*:*OR cpe:/a:netapp:storagegrid:-:*:*:*:*:*:*:*OR cpe:/a:netapp:solidfire:-:*:*:*:*:*:*:*OR cpe:/a:netapp:hci_management_node:-:*:*:*:*:*:*:*OR cpe:/a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*OR cpe:/a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*OR cpe:/a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* (Version >= 11.0 and <= 11.70.2) Configuration 3: cpe:/o:netapp:bootstrap_os:-:*:*:*:*:*:*:*AND cpe:/h:netapp:hci_compute_node:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:netapp:h300s_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h300s:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:netapp:h500s_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h500s:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:netapp:h700s_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h700s:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:netapp:h300e_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h300e:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:netapp:h500e_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h500e:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:netapp:h700e_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h700e:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:netapp:h410s_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h410s:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:netapp:h410c_firmware:-:*:*:*:*:*:*:*AND cpe:/h:netapp:h410c:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:linux:linux_kernel:4.18:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.19:-:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |