PT-2025-8623 · Linux · Linux Kernel

Published

2025-02-26

·

Updated

2025-02-26

·

CVE-2022-49690

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description A vulnerability in the Linux kernel has been identified, where the tls sk proto close function is executed repeatedly due to an incorrect update of the ctx->sk proto to sock->sk prot by tls update(). This leads to a null pointer dereference bug, as indicated by the KASAN report. The issue occurs when closing a socket, triggering the tls sk proto close function, which in turn calls ctx->sk proto->close(), resulting in repeated execution of tls sk proto close. The problem arises from updating a protocol that is the same as sock->sk prot, which is incorrect.
Recommendations To resolve this issue, add a check for equality between the protocol and sock->sk prot at the beginning of the tls update() function to prevent incorrect updates. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Related Identifiers

CVE-2022-49690

Affected Products

Linux Kernel