An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.
[
{
"target": {
"file": "net/tipc/socket.c"
},
"source": "https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523",
"id": "CVE-2022-0382-4d8ba9d0",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"124294063488410809775450633252685426888",
"102472280358826779505556682088890264894",
"42498334705700929513113162314260116360"
]
},
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"function": "__tipc_sendmsg",
"file": "net/tipc/socket.c"
},
"source": "https://github.com/torvalds/linux/commit/d6d86830705f173fca6087a3e67ceaf68db80523",
"id": "CVE-2022-0382-bc5298c2",
"signature_version": "v1",
"digest": {
"function_hash": "310476055889135787152425483883035242947",
"length": 2965.0
},
"deprecated": false,
"signature_type": "Function"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0382.json"