CVE-2022-49732

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
24/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sock: redo the psock vs ULP protection check<br /> <br /> Commit 8a59f9d1e3d4 ("sock: Introduce sk-&gt;sk_prot-&gt;psock_update_sk_prot()")<br /> has moved the inet_csk_has_ulp(sk) check from sk_psock_init() to<br /> the new tcp_bpf_update_proto() function. I&amp;#39;m guessing that this<br /> was done to allow creating psocks for non-inet sockets.<br /> <br /> Unfortunately the destruction path for psock includes the ULP<br /> unwind, so we need to fail the sk_psock_init() itself.<br /> Otherwise if ULP is already present we&amp;#39;ll notice that later,<br /> and call tcp_update_ulp() with the sk_proto of the ULP<br /> itself, which will most likely result in the ULP looping<br /> its callbacks.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.13 (including) 5.15.51 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.18.8 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*