Updated: 2026-02-27 00:48:01.419715
Description:
A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 8.2 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 8.2 | HIGH | Already Fixed | 2024-01-20 08:37:56 | ||
| CentOS 6 ELS | kernel | 2.6.32 | 8.2 | HIGH | Not Vulnerable | 2024-01-05 03:42:12 | Not affected: CVE‑2022‑1012 targets the TCP source‑port selection “perturbation table” log... | |
| CentOS 7 ELS | kernel | 3.10.0 | 8.2 | HIGH | Not Vulnerable | 2023-11-03 09:33:09 | Not vulnerable: CVE-2022-1012 targets the table-based TCP source-port selection mechanism (“pertur... | |
| CentOS 8.4 ELS | kernel | 4.18.0 | 8.2 | HIGH | Released | CLSA-2024:1731430561 | 2022-10-20 14:03:42 | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 8.2 | HIGH | Released | CLSA-2024:1731431059 | 2022-10-20 11:03:50 | |
| CloudLinux 6 ELS | kernel | 2.6.32 | 8.2 | HIGH | Not Vulnerable | 2023-10-27 11:18:54 | ||
| Oracle Linux 6 ELS | kernel | 2.6.32 | 8.2 | HIGH | Not Vulnerable | 2024-01-05 03:42:12 | Not affected: CVE‑2022‑1012 targets the TCP source‑port selection “perturbation table” log... | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 8.2 | HIGH | Released | CLSA-2022:1666115300 | 2022-10-18 14:02:37 | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 8.2 | HIGH | Released | CLSA-2023:1684277390 | 2023-05-16 21:24:41 | |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 8.2 | HIGH | Already Fixed | 2023-06-02 09:10:24 |