CVE-2022-48780
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/07/2024
Last modified:
03/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/smc: Avoid overwriting the copies of clcsock callback functions<br />
<br />
The callback functions of clcsock will be saved and replaced during<br />
the fallback. But if the fallback happens more than once, then the<br />
copies of these callback functions will be overwritten incorrectly,<br />
resulting in a loop call issue:<br />
<br />
clcsk->sk_error_report<br />
|- smc_fback_error_report() clcsk_error_report() ------------------|<br />
<br />
So this patch fixes the issue by saving these function pointers only<br />
once in the fallback and avoiding overwriting.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.22 (including) | 5.15.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16.8 (including) | 5.16.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8
- https://git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6
- https://git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842
- https://git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8
- https://git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6
- https://git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842



