Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-1678

Опубликовано: 25 мая 2022
Источник: debian

Описание

An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.2.6-1package
linuxfixed4.19.232-1busterpackage
linuxnot-affectedstretchpackage

Примечания

  • https://bugzilla.openanolis.cn/show_bug.cgi?id=61

  • https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing@gmail.com/

  • https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0a70f118475e037732557796accd0878a00fc25a

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 3 лет назад

An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.

CVSS3: 7.5
redhat
больше 3 лет назад

An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.

CVSS3: 5.9
nvd
больше 3 лет назад

An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.

CVSS3: 7.5
fstec
около 4 лет назад

Уязвимость компонента TCP Pace Handler функции tcp_internal_pacing в файле net/ipv4/tcp_output.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании