-

CVE-2022-50838

In the Linux kernel, the following vulnerability has been resolved:

net: stream: purge sk_error_queue in sk_stream_kill_queues()

Changheon Lee reported TCP socket leaks, with a nice repro.

It seems we leak TCP sockets with the following sequence:

1) SOF_TIMESTAMPING_TX_ACK is enabled on the socket.

   Each ACK will cook an skb put in error queue, from __skb_tstamp_tx().
   __skb_tstamp_tx() is using skb_clone(), unless
   SOF_TIMESTAMPING_OPT_TSONLY was also requested.

2) If the application is also using MSG_ZEROCOPY, then we put in the
   error queue cloned skbs that had a struct ubuf_info attached to them.

   Whenever an struct ubuf_info is allocated, sock_zerocopy_alloc()
   does a sock_hold().

   As long as the cloned skbs are still in sk_error_queue,
   socket refcount is kept elevated.

3) Application closes the socket, while error queue is not empty.

Since tcp_close() no longer purges the socket error queue,
we might end up with a TCP socket with at least one skb in
error queue keeping the socket alive forever.

This bug can be (ab)used to consume all kernel memory
and freeze the host.

We need to purge the error queue, with proper synchronization
against concurrent writers.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < c8c1eec578a9ae2dc8f14a1846942a0b7bf29d1d
Version 7737b104c211fa843de268b897d601e070292a72
Status affected
Version < bab542cf56fc174c8447c00b73be99ffd66d2d39
Version 89be5c357de34718eaaaefed80737f432c5ab86f
Status affected
Version < 6f00bd0402a1e3d2d556afba57c045bd7931e4d3
Version 8b8b3d738e450d2c2ccdc75f0ab5a951746c2a96
Status affected
Version < 4f1d37ff4226eb99d6b69e9f4518e279e1a851bf
Version b631c603b5fb98d2bd709c35d384901965a3dd51
Status affected
Version < 9062493811676ee0efe6c74d98f00ca38c4e17d4
Version daf15fa1fd997749e881aedd9f03f73a11240e82
Status affected
Version < 9da204cd67c4fe97e8aa465d10d5c2e7076f7f42
Version 3988164fe9ddf98ebf5b5cdede91ac38c5f08a7e
Status affected
Version < 8c330c36b3970d0917f48827fa6c7a9c75aa4602
Version 24bcbe1cc69fa52dc4f7b5b2456678ed464724d8
Status affected
Version < b458d349f8753f666233828ebd30df6f100cf7d5
Version 24bcbe1cc69fa52dc4f7b5b2456678ed464724d8
Status affected
Version < e0c8bccd40fc1c19e1d246c39bcf79e357e1ada3
Version 24bcbe1cc69fa52dc4f7b5b2456678ed464724d8
Status affected
Version 6ba975e14f5ebb87143d737c493adf4031409a68
Status affected
Version 4437f3ead9e85c35fe0e3adfb98c0b97eaa267eb
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.16
Status affected
Version < 5.16
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.337
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.145
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.