Back to bug 2091704

Who When What Removed Added
Guilherme de Almeida Suckevicz 2022-05-30 19:08:02 UTC Depends On 2091705
Guilherme de Almeida Suckevicz 2022-05-30 19:08:16 UTC Blocks 2091706
Red Hat Bugzilla 2022-06-04 08:04:32 UTC CC fpacheco
Red Hat Bugzilla 2022-07-16 03:20:23 UTC CC brdeoliv
Wade Mealing 2022-08-26 05:06:41 UTC Fixed In Version kernel4.20-rc1
Wade Mealing 2022-08-29 04:09:24 UTC Doc Text An incorrect update of sock reference in TCP pacing can lead to memory leak, wasting memory on the system (DOS.)
Wade Mealing 2022-08-29 04:13:26 UTC Depends On 2122085, 2122086
RaTasha Tillery-Smith 2022-08-29 12:49:35 UTC Doc Text An incorrect update of sock reference in TCP pacing can lead to memory leak, wasting memory on the system (DOS.) A flaw was found in the Linux kernel. An incorrect update of the sock reference in TCP pacing can lead to a memory leak, wasting memory on the system.
Wade Mealing 2022-08-30 02:27:17 UTC Fixed In Version kernel4.20-rc1 kernel-4.20-rc1
Summary CVE-2022-1678 kernel: improper update of sock reference in TCP pacing can lead to memory/netns leak CVE-2022-1678 kernel: improper update of sock reference in TCP pacing can lead to memory leak
Red Hat Bugzilla 2022-12-31 23:34:42 UTC CC fhrbata
Red Hat Bugzilla 2023-04-01 08:39:43 UTC CC dhoward
Red Hat Bugzilla 2023-07-07 08:27:47 UTC Assignee security-response-team nobody

Back to bug 2091704