CVE-2022-0382

Source
https://cve.org/CVERecord?id=CVE-2022-0382
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-0382.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-0382
Downstream
Published
2022-02-11T00:00:00Z
Modified
2026-05-15T11:53:38.857048771Z
Summary
[none]
Details

An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

Database specific
{
    "cwe_ids": [
        "CWE-909"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/0xxx/CVE-2022-0382.json",
    "cna_assigner": "redhat"
}
References

Affected packages