SB2025062077 - Improper locking in Linux kernel rxrpc
Published: June 20, 2025 Updated: June 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper locking (CVE-ID: CVE-2022-49998)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rxrpc_wait_for_tx_window_intr(), rxrpc_send_data(), rxrpc_do_sendmsg() and rxrpc_kernel_send_data() functions in net/rxrpc/sendmsg.c, within the rxrpc_new_client_call() function in net/rxrpc/call_object.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/091dc91e119fdd61432347231724f4e861c6b465
- https://git.kernel.org/stable/c/2bc769b8edb158be7379d15f36e23d66cf850053
- https://git.kernel.org/stable/c/79e2ca7aa96e80961828ab6312264633b66183cc
- https://git.kernel.org/stable/c/b0f571ecd7943423c25947439045f0d352ca3dbf
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.140
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.64
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0