CVE-2022-50459
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-476
Desreferencia a puntero nulo (NULL)
Fecha de publicación:
01/10/2025
Última modificación:
16/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()<br />
<br />
Fix a NULL pointer crash that occurs when we are freeing the socket at the<br />
same time we access it via sysfs.<br />
<br />
The problem is that:<br />
<br />
1. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() take<br />
the frwd_lock and do sock_hold() then drop the frwd_lock. sock_hold()<br />
does a get on the "struct sock".<br />
<br />
2. iscsi_sw_tcp_release_conn() does sockfd_put() which does the last put<br />
on the "struct socket" and that does __sock_release() which sets the<br />
sock->ops to NULL.<br />
<br />
3. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() then<br />
call kernel_getpeername() which accesses the NULL sock->ops.<br />
<br />
Above we do a get on the "struct sock", but we needed a get on the "struct<br />
socket". Originally, we just held the frwd_lock the entire time but in<br />
commit bcf3a2953d36 ("scsi: iscsi: iscsi_tcp: Avoid holding spinlock while<br />
calling getpeername()") we switched to refcount based because the network<br />
layer changed and started taking a mutex in that path, so we could no<br />
longer hold the frwd_lock.<br />
<br />
Instead of trying to maintain multiple refcounts, this just has us use a<br />
mutex for accessing the socket in the interface code paths.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8.14 (incluyendo) | 5.9 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9.1 (incluyendo) | 5.10.150 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.75 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 5.19.17 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (incluyendo) | 6.0.3 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:5.9:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.9:rc8:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0a0b861fce2657ba08ec356a74346b37ca4b2008
- https://git.kernel.org/stable/c/57569c37f0add1b6489e1a1563c71519daf732cf
- https://git.kernel.org/stable/c/884a788f065578bb640382279a83d1df433b13e6
- https://git.kernel.org/stable/c/897dbbc57d71e8a34ec1af8e573a142de457da38
- https://git.kernel.org/stable/c/a26b0658751bb0a3b28386fca715333b104d32a2



