Back to bug 2091704
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2022-05-30 19:08:02 UTC | Depends On | 2091705 | |
| Guilherme de Almeida Suckevicz | 2022-05-30 19:08:16 UTC | Blocks | 2091706 | |
| Red Hat Bugzilla | 2022-06-04 08:04:32 UTC | CC | fpacheco | |
| Red Hat Bugzilla | 2022-07-16 03:20:23 UTC | CC | brdeoliv | |
| Wade Mealing | 2022-08-26 05:06:41 UTC | Fixed In Version | kernel4.20-rc1 | |
| Wade Mealing | 2022-08-29 04:09:24 UTC | Doc Text | An incorrect update of sock reference in TCP pacing can lead to memory leak, wasting memory on the system (DOS.) | |
| Wade Mealing | 2022-08-29 04:13:26 UTC | Depends On | 2122085, 2122086 | |
| RaTasha Tillery-Smith | 2022-08-29 12:49:35 UTC | Doc Text | An incorrect update of sock reference in TCP pacing can lead to memory leak, wasting memory on the system (DOS.) | A flaw was found in the Linux kernel. An incorrect update of the sock reference in TCP pacing can lead to a memory leak, wasting memory on the system. |
| Wade Mealing | 2022-08-30 02:27:17 UTC | Fixed In Version | kernel4.20-rc1 | kernel-4.20-rc1 |
| Summary | CVE-2022-1678 kernel: improper update of sock reference in TCP pacing can lead to memory/netns leak | CVE-2022-1678 kernel: improper update of sock reference in TCP pacing can lead to memory leak | ||
| Red Hat Bugzilla | 2022-12-31 23:34:42 UTC | CC | fhrbata | |
| Red Hat Bugzilla | 2023-04-01 08:39:43 UTC | CC | dhoward | |
| Red Hat Bugzilla | 2023-07-07 08:27:47 UTC | Assignee | security-response-team | nobody |
Back to bug 2091704