CVE-2022-49372

Source
https://cve.org/CVERecord?id=CVE-2022-49372
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49372.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49372
Downstream
Related
Published
2025-02-26T02:11:14.119Z
Modified
2026-04-11T11:56:52.179986Z
Summary
tcp: tcp_rtx_synack() can be called from process context
Details

In the Linux kernel, the following vulnerability has been resolved:

tcp: tcprtxsynack() can be called from process context

Laurent reported the enclosed report [1]

This bug triggers with following coditions:

0) Kernel built with CONFIGDEBUGPREEMPT=y

1) A new passive FastOpen TCP socket is created. This FO socket waits for an ACK coming from client to be a complete ESTABLISHED one. 2) A socket operation on this socket goes through locksock() releasesock() dance. 3) While the socket is owned by the user in step 2), a retransmit of the SYN is received and stored in socket backlog. 4) At releasesock() time, the socket backlog is processed while in process context. 5) A SYNACK packet is cooked in response of the SYN retransmit. 6) -> tcprtx_synack() is called in process context.

Before blamed commit, tcprtxsynack() was always called from BH handler, from a timer handler.

Fix this by using TCPINCSTATS() & NETINCSTATS() which do not assume caller is in non preemptible context.

[1] BUG: using __thiscpuadd() in preemptible [00000000] code: epollpep/2180 caller is tcp_rtxsynack.part.0+0x36/0xc0 CPU: 10 PID: 2180 Comm: epollpep Tainted: G OE 5.16.0-0.bpo.4-amd64 #1 Debian 5.16.12-1~bpo11+1 Hardware name: Supermicro SYS-5039MC-H8TRF/X11SCD-F, BIOS 1.7 11/23/2021 Call Trace: <TASK> dumpstacklvl+0x48/0x5e checkpreemptiondisabled+0xde/0xe0 tcprtxsynack.part.0+0x36/0xc0 tcprtxsynack+0x8d/0xa0 ? kmemcachealloc+0x2e0/0x3e0 ? apparmorfileallocsecurity+0x3b/0x1f0 inetrtxsynack+0x16/0x30 tcpcheckreq+0x367/0x610 tcprcvstateprocess+0x91/0xf60 ? getnohztimertarget+0x18/0x1a0 ? locktimerbase+0x61/0x80 ? preemptcountadd+0x68/0xa0 tcpv4dorcv+0xbd/0x270 __releasesock+0x6d/0xb0 releasesock+0x2b/0x90 sock_setsockopt+0x138/0x1140 ? __sysgetsockname+0x7e/0xc0 ? aask_perm+0x3e/0x1a0 __sys_setsockopt+0x198/0x1e0 __x64syssetsockopt+0x21/0x30 dosyscall64+0x38/0xc0 entrySYSCALL64afterhwframe+0x44/0xae

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49372.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
168a8f58059a22feb9e9a2dcc1b8053dbbbc12ef
Fixed
3db889f883e65bbd3b1401279bfc1e9ed255c481
Fixed
c348b0f8d035fc4bdc040796889beec7218bd1b8
Fixed
58bd38cbc961fd799842b7be8c5222310f04b908
Fixed
d05c2fdf8e10528bb6751bd95243e862d5402a9b
Fixed
0a0f7f84148445c9f02f226928803a870139d820
Fixed
88cd232146207ff1d41dededed5e77c0d4438113
Fixed
bdc28a8fb43cc476e33b11519235adb816ce00e8
Fixed
d8e1bc6029acac796293310aacef7b7336f35b6a
Fixed
0a375c822497ed6ad6b5da0792a12a6f1af10c0b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49372.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.7.0
Fixed
4.9.318
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.283
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49372.json"