In the Linux kernel, the following vulnerability has been resolved:
net/smc: Avoid overwriting the copies of clcsock callback functions
The callback functions of clcsock will be saved and replaced during
the fallback. But if the fallback happens more than once, then the
copies of these callback functions will be overwritten incorrectly,
resulting in a loop call issue:
clcsk->sk_error_report
|- smc_fback_error_report() <------------------------------|
|- smc_fback_forward_wakeup() | (loop)
|- clcsock_callback() (incorrectly overwritten) |
|- smc->clcsk_error_report() ------------------|
So this patch fixes the issue by saving these function pointers only
once in the fallback and avoiding overwriting.
git.kernel.org/linus/1de9770d121ee9294794cca0e0be8fbfa0134ee8 (5.17-rc5)
git.kernel.org/stable/c/1de9770d121ee9294794cca0e0be8fbfa0134ee8
git.kernel.org/stable/c/7de7ba7a8bd4fde0141de8674c13514d0072f0e6
git.kernel.org/stable/c/f00b6c976ae0dfbd9b891175f713f59095d23842
launchpad.net/bugs/cve/CVE-2022-48780
nvd.nist.gov/vuln/detail/CVE-2022-48780
security-tracker.debian.org/tracker/CVE-2022-48780
www.cve.org/CVERecord?id=CVE-2022-48780