CVE-2022-48780

medium

Description

In the Linux kernel, the following vulnerability has been resolved: net/smc: Avoid overwriting the copies of clcsock callback functions The callback functions of clcsock will be saved and replaced during the fallback. But if the fallback happens more than once, then the copies of these callback functions will be overwritten incorrectly, resulting in a loop call issue: clcsk->sk_error_report |- smc_fback_error_report() <------------------------------| |- smc_fback_forward_wakeup() | (loop) |- clcsock_callback() (incorrectly overwritten) | |- smc->clcsk_error_report() ------------------| So this patch fixes the issue by saving these function pointers only once in the fallback and avoiding overwriting.

References

https://git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842

https://git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6

https://git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8

Details

Source: Mitre, NVD

Published: 2024-07-16

Updated: 2024-07-16

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium