In the Linux kernel, the following vulnerability has been resolved:
kcm: fix strp_init() order and cleanup
strp_init() is called just a few lines above this csk->sk_user_data
check, it also initializes strp->work etc., therefore, it is
unnecessary to call strp_done() to cancel the freshly initialized
work.
And if sk_user_data is already used by KCM, psock->strp should not be
touched, particularly strp->work state, so we need to move strp_init()
after the csk->sk_user_data check.
This also makes a lockdep warning reported by syzbot go away.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-06-18 11:15
Updated : 2025-11-14 18:10
NVD link : CVE-2022-49957
Mitre link : CVE-2022-49957
CVE.ORG link : CVE-2022-49957
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-908
Use of Uninitialized Resource
