CVE-2022-48780

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/07/2024
Last modified:
03/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/smc: Avoid overwriting the copies of clcsock callback functions<br /> <br /> The callback functions of clcsock will be saved and replaced during<br /> the fallback. But if the fallback happens more than once, then the<br /> copies of these callback functions will be overwritten incorrectly,<br /> resulting in a loop call issue:<br /> <br /> clcsk-&gt;sk_error_report<br /> |- smc_fback_error_report() clcsk_error_report() ------------------|<br /> <br /> So this patch fixes the issue by saving these function pointers only<br /> once in the fallback and avoiding overwriting.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.22 (including) 5.15.25 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16.8 (including) 5.16.11 (excluding)
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*