{"id":"CVE-2022-1678","details":"An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.","modified":"2026-04-11T23:37:40.871021Z","published":"2022-05-25T15:15:07.887Z","references":[{"type":"WEB","url":"https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing%40gmail.com/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220715-0001/"},{"type":"ADVISORY","url":"https://anas.openanolis.cn/cves/detail/CVE-2022-1678"},{"type":"ADVISORY","url":"https://anas.openanolis.cn/errata/detail/ANSA-2022:0143"},{"type":"REPORT","url":"https://gitee.com/anolis/cloud-kernel/commit/bed537da691b"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a"},{"type":"FIX","url":"https://bugzilla.openanolis.cn/show_bug.cgi?id=61"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/torvalds/linux","events":[{"introduced":"94710cac0ef4ee177a63b5227664b38c95bbf703"},{"last_affected":"84df9525b0c27f3ebc2ebb1864fa62a97fdedb7d"},{"fixed":"0a70f118475e037732557796accd0878a00fc25a"}],"database_specific":{"versions":[{"introduced":"4.18"},{"last_affected":"4.19"}]}}],"versions":["v4.18","v4.19","v4.19-rc1","v4.19-rc2","v4.19-rc3","v4.19-rc4","v4.19-rc5","v4.19-rc6","v4.19-rc7","v4.19-rc8"],"database_specific":{"vanir_signatures_modified":"2026-04-11T23:37:40Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1678.json","vanir_signatures":[{"target":{"file":"net/ipv4/tcp_output.c","function":"tcp_internal_pacing"},"source":"https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a","signature_version":"v1","id":"CVE-2022-1678-0df982cb","digest":{"length":403,"function_hash":"305071588974209152896318375609835825469"},"deprecated":false,"signature_type":"Function"},{"target":{"file":"net/ipv4/tcp_output.c"},"source":"https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a","signature_version":"v1","id":"CVE-2022-1678-16f06743","digest":{"threshold":0.9,"line_hashes":["112252161494150687482036146125572582170","235936696653281744945860350624661839109","126822610119063424830083512208756404832","290467829325330578600547636386127407096","275756602238725442082541821754179757415","127729833077943498858366290054601550388","12254256495553939721132668985928608417","97119719173496647318399972531451910764","157601116724117759374458089288687763630","10744231015606377960633981584297661864","320241906312485608331540539935456087938","327840302940249777065427093547961645362","277086011243935152731600802316647074050","151173560891552895257868094899955351763","295717241335571189801146611213839538739","258662546911841284106043561359826880851","95805330754213299442534748805951690057","180394038107596606653723083168103403469","135098824718966649812470483590846963308","209618383292723648883906424264739600836","141370366897576561613486736914788469264","62260680681670653339834781117750876622","44122123852268249258525801986748381301"]},"deprecated":false,"signature_type":"Line"},{"target":{"file":"net/ipv4/tcp_output.c","function":"tcp_mtu_probe"},"source":"https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a","signature_version":"v1","id":"CVE-2022-1678-ba78d18a","digest":{"length":2751,"function_hash":"237927386148102752937457509424305737820"},"deprecated":false,"signature_type":"Function"}],"unresolved_ranges":[{"events":[{"introduced":"11.0"},{"last_affected":"11.70.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}