cvelist/2022/49xxx/CVE-2022-49013.json
2024-11-04 13:02:23 +00:00

135 lines
7.4 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-49013",
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: fix memory leak in sctp_stream_outq_migrate()\n\nWhen sctp_stream_outq_migrate() is called to release stream out resources,\nthe memory pointed to by prio_head in stream out is not released.\n\nThe memory leak information is as follows:\n unreferenced object 0xffff88801fe79f80 (size 64):\n comm \"sctp_repo\", pid 7957, jiffies 4294951704 (age 36.480s)\n hex dump (first 32 bytes):\n 80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff ................\n 90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff ................\n backtrace:\n [<ffffffff81b215c6>] kmalloc_trace+0x26/0x60\n [<ffffffff88ae517c>] sctp_sched_prio_set+0x4cc/0x770\n [<ffffffff88ad64f2>] sctp_stream_init_ext+0xd2/0x1b0\n [<ffffffff88aa2604>] sctp_sendmsg_to_asoc+0x1614/0x1a30\n [<ffffffff88ab7ff1>] sctp_sendmsg+0xda1/0x1ef0\n [<ffffffff87f765ed>] inet_sendmsg+0x9d/0xe0\n [<ffffffff8754b5b3>] sock_sendmsg+0xd3/0x120\n [<ffffffff8755446a>] __sys_sendto+0x23a/0x340\n [<ffffffff87554651>] __x64_sys_sendto+0xe1/0x1b0\n [<ffffffff89978b49>] do_syscall_64+0x39/0xb0\n [<ffffffff89a0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "637784ade221",
"version_value": "a7555681e50b"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.15",
"status": "affected"
},
{
"version": "0",
"lessThan": "4.15",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.4.226",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.10.158",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.15.82",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.0.12",
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "6.1",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/a7555681e50bdebed2c40ff7404ee73c2e932993",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a7555681e50bdebed2c40ff7404ee73c2e932993"
},
{
"url": "https://git.kernel.org/stable/c/176ee6c673ccd118e9392fd2dbb165423bdb99ca",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/176ee6c673ccd118e9392fd2dbb165423bdb99ca"
},
{
"url": "https://git.kernel.org/stable/c/0dfb9a566327182387c90100ea54d8426cee8c67",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0dfb9a566327182387c90100ea54d8426cee8c67"
},
{
"url": "https://git.kernel.org/stable/c/fa20f88271259d42ebe66f0a8c4c20199e888c99",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fa20f88271259d42ebe66f0a8c4c20199e888c99"
},
{
"url": "https://git.kernel.org/stable/c/9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/9ed7bfc79542119ac0a9e1ce8a2a5285e43433e9"
}
]
},
"generator": {
"engine": "bippy-9e1c9544281a"
}
}