SB20250502212 - Improper locking in Linux kernel kcm
Published: May 2, 2025 Updated: May 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper locking (CVE-ID: CVE-2022-49814)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the requeue_rx_msgs(), kcm_wait_data(), KCM_STATS_INCR() and kcm_splice_read() functions in net/kcm/kcmsock.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/22f6b5d47396b4287662668ee3f5c1f766cb4259
- https://git.kernel.org/stable/c/4154b6afa2bd639214ff259d912faad984f7413a
- https://git.kernel.org/stable/c/5121197ecc5db58c07da95eb1ff82b98b121a221
- https://git.kernel.org/stable/c/bf92e54597d842da127c59833b365d6faeeaf020
- https://git.kernel.org/stable/c/ce57d6474ae999a3b2d442314087473a646a65c7
- https://git.kernel.org/stable/c/d9ad4de92e184b19bcae4da10dac0275abf83931
- https://git.kernel.org/stable/c/f7b0e95071bb4be4b811af3f0bfc3e200eedeaa3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.80