An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1678.json"
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 403.0,
"function_hash": "305071588974209152896318375609835825469"
},
"signature_type": "Function",
"id": "CVE-2022-1678-0df982cb",
"source": "https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a",
"target": {
"function": "tcp_internal_pacing",
"file": "net/ipv4/tcp_output.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"112252161494150687482036146125572582170",
"235936696653281744945860350624661839109",
"126822610119063424830083512208756404832",
"290467829325330578600547636386127407096",
"275756602238725442082541821754179757415",
"127729833077943498858366290054601550388",
"12254256495553939721132668985928608417",
"97119719173496647318399972531451910764",
"157601116724117759374458089288687763630",
"10744231015606377960633981584297661864",
"320241906312485608331540539935456087938",
"327840302940249777065427093547961645362",
"277086011243935152731600802316647074050",
"151173560891552895257868094899955351763",
"295717241335571189801146611213839538739",
"258662546911841284106043561359826880851",
"95805330754213299442534748805951690057",
"180394038107596606653723083168103403469",
"135098824718966649812470483590846963308",
"209618383292723648883906424264739600836",
"141370366897576561613486736914788469264",
"62260680681670653339834781117750876622",
"44122123852268249258525801986748381301"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-1678-16f06743",
"source": "https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a",
"target": {
"file": "net/ipv4/tcp_output.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 2751.0,
"function_hash": "237927386148102752937457509424305737820"
},
"signature_type": "Function",
"id": "CVE-2022-1678-ba78d18a",
"source": "https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a",
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
}
}
]