CVE-2022-48780

In the Linux kernel, the following vulnerability has been resolved: net/smc: Avoid overwriting the copies of clcsock callback functions The callback functions of clcsock will be saved and replaced during the fallback. But if the fallback happens more than once, then the copies of these callback functions will be overwritten incorrectly, resulting in a loop call issue: clcsk->sk_error_report |- smc_fback_error_report() <------------------------------| |- smc_fback_forward_wakeup() | (loop) |- clcsock_callback() (incorrectly overwritten) | |- smc->clcsk_error_report() ------------------| So this patch fixes the issue by saving these function pointers only once in the fallback and avoiding overwriting.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*

History

03 Oct 2025, 14:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8 - () https://git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8 - Patch
References () https://git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6 - () https://git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6 - Patch
References () https://git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842 - () https://git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842 - Patch
CWE CWE-835
CPE cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8 - () https://git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8 -
References () https://git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6 - () https://git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6 -
References () https://git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842 - () https://git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/smc: evite sobrescribir las copias de las funciones de devolución de llamada de clcsock. Las funciones de devolución de llamada de clcsock se guardarán y reemplazarán durante la reserva. Pero si el retroceso ocurre más de una vez, las copias de estas funciones de devolución de llamada se sobrescribirán incorrectamente, lo que provocará un problema de llamada en bucle: clcsk-&gt;sk_error_report |- smc_fback_error_report() &lt;------------ ------------------| |- smc_fback_forward_wakeup() | (bucle) |- clcsock_callback() (sobrescrito incorrectamente) | |- smc-&gt;clcsk_error_report() ------------------| Por lo tanto, este parche soluciona el problema al guardar estos punteros de función solo una vez en el respaldo y evitar la sobrescritura.

16 Jul 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 12:15

Updated : 2025-10-03 14:32


NVD link : CVE-2022-48780

Mitre link : CVE-2022-48780

CVE.ORG link : CVE-2022-48780


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')