Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-49690

Опубликовано: 26 фев. 2025
Источник: redhat
CVSS3: 5.5

Описание

[REJECTED CVE] A vulnerability was identified in the net/tls module of the Linux kernel where the tls_sk_proto_close() function could be executed repeatedly during socket teardown due to improper protocol pointer handling in tls_update(). This recursive invocation could lead to a NULL pointer dereference and kernel panic. An attacker exploiting this flaw could potentially trigger a denial of service by forcing repeated close operations on a crafted TLS socket.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelOut of support scope
Red Hat Enterprise Linux 8kernel-rtOut of support scope
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2347907kernel: net/tls: fix tls_sk_proto_close executed repeatedly

5.5 Medium

CVSS3

Связанные уязвимости

nvd
12 месяцев назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

5.5 Medium

CVSS3