#VU111588 Improper locking in Linux kernel - CVE-2022-49998
Published: June 20, 2025 / Updated: June 21, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the rxrpc_wait_for_tx_window_intr(), rxrpc_send_data(), rxrpc_do_sendmsg() and rxrpc_kernel_send_data() functions in net/rxrpc/sendmsg.c, within the rxrpc_new_client_call() function in net/rxrpc/call_object.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/091dc91e119fdd61432347231724f4e861c6b465
- https://git.kernel.org/stable/c/2bc769b8edb158be7379d15f36e23d66cf850053
- https://git.kernel.org/stable/c/79e2ca7aa96e80961828ab6312264633b66183cc
- https://git.kernel.org/stable/c/b0f571ecd7943423c25947439045f0d352ca3dbf
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.140
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.64
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0