Bug 1205704 - (CVE-2022-4128) VUL-0: CVE-2022-4128: kernel-source-azure,kernel-source,kernel-source-rt: kernel: mptcp: NULL pointer dereference in subflow traversal at disconnect time
(CVE-2022-4128)
VUL-0: CVE-2022-4128: kernel-source-azure,kernel-source,kernel-source-rt: ker...
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: Kernel Bugs
Security Team bot
https://smash.suse.de/issue/348787/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-11-24 09:12 UTC by Hu
Modified: 2022-11-24 09:12 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hu 2022-11-24 09:12:16 UTC
rh#2134380

At disconnect time the MPTCP protocol traverse the subflows list closing each of them. In some circumstances - MPJ subflow, passive MPTCP socket, the latter operation can remove the subflow from the list, invalidating the current iterator. This could lead to a NULL pointer dereference issue.

Upstream patch & commit:
https://lore.kernel.org/netdev/20220708233610.410786-2-mathew.j.martineau@linux.intel.com/
https://github.com/torvalds/linux/commit/5c835bb142d4

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2134380
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4128
Comment 1 Hu 2022-11-24 09:12:39 UTC
Not Affected:
- cve/linux-3.0
- cve/linux-4.4
- cve/linux-4.12
- cve/linux-5.3
- SLE15-SP4
- SLE15-SP3
- SLE12-SP5

Already fixed:
- stable


Closing