cvelist/2022/48xxx/CVE-2022-48909.json

124 lines
6.8 KiB
JSON
Raw Normal View History

2024-08-21 07:01:01 +00:00
{
2024-08-22 02:00:58 +00:00
"data_version": "4.0",
2024-08-21 07:01:01 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-48909",
2024-08-22 02:00:58 +00:00
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
2024-08-21 07:01:01 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-08-22 02:00:58 +00:00
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix connection leak\n\nThere's a potential leak issue under following execution sequence :\n\nsmc_release \t\t\t\tsmc_connect_work\nif (sk->sk_state == SMC_INIT)\n\t\t\t\t\tsend_clc_confirim\n\ttcp_abort();\n\t\t\t\t\t...\n\t\t\t\t\tsk.sk_state = SMC_ACTIVE\nsmc_close_active\nswitch(sk->sk_state) {\n...\ncase SMC_ACTIVE:\n\tsmc_close_final()\n\t// then wait peer closed\n\nUnfortunately, tcp_abort() may discard CLC CONFIRM messages that are\nstill in the tcp send buffer, in which case our connection token cannot\nbe delivered to the server side, which means that we cannot get a\npassive close message at all. Therefore, it is impossible for the to be\ndisconnected at all.\n\nThis patch tries a very simple way to avoid this issue, once the state\nhas changed to SMC_ACTIVE after tcp_abort(), we can actively abort the\nsmc connection, considering that the state is SMC_INIT before\ntcp_abort(), abandoning the complete disconnection process should not\ncause too much problem.\n\nIn fact, this problem may exist as long as the CLC CONFIRM message is\nnot received by the server. Whether a timer should be added after\nsmc_close_final() needs to be discussed in the future. But even so, this\npatch provides a faster release for connection in above case, it should\nalso be valuable."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
2024-08-21 07:01:01 +00:00
}
]
2024-08-22 02:00:58 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "39f41f367b08",
"version_value": "2e8d465b83db"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.3",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.3",
"status": "unaffected",
2024-11-04 13:01:15 +00:00
"versionType": "semver"
2024-08-22 02:00:58 +00:00
},
{
"version": "5.10.104",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
2024-11-04 13:01:15 +00:00
"versionType": "semver"
2024-08-22 02:00:58 +00:00
},
{
"version": "5.15.27",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
2024-11-04 13:01:15 +00:00
"versionType": "semver"
2024-08-22 02:00:58 +00:00
},
{
"version": "5.16.13",
"lessThanOrEqual": "5.16.*",
"status": "unaffected",
2024-11-04 13:01:15 +00:00
"versionType": "semver"
2024-08-22 02:00:58 +00:00
},
{
"version": "5.17",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/2e8d465b83db307f04ad265848f8ab3f78f6918f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2e8d465b83db307f04ad265848f8ab3f78f6918f"
},
{
"url": "https://git.kernel.org/stable/c/80895b6f9154fb22d36fab311ccbb75503a2c87b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/80895b6f9154fb22d36fab311ccbb75503a2c87b"
},
{
"url": "https://git.kernel.org/stable/c/e98d46ccfa84b35a9e4b1ccdd83961b41a5d7ce5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e98d46ccfa84b35a9e4b1ccdd83961b41a5d7ce5"
},
{
"url": "https://git.kernel.org/stable/c/9f1c50cf39167ff71dc5953a3234f3f6eeb8fcb5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/9f1c50cf39167ff71dc5953a3234f3f6eeb8fcb5"
}
]
},
"generator": {
2024-11-04 13:01:15 +00:00
"engine": "bippy-9e1c9544281a"
2024-08-21 07:01:01 +00:00
}
}