{"uuid": "952c0791-bd79-4ef1-a603-e919c0abbd59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-48909", "type": "seen", "source": "https://t.me/cvedetector/3858", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2022-48909 - \"Linux SMC Connection Leak\"\", \n  \"Content\": \"CVE ID : CVE-2022-48909 \nPublished : Aug. 22, 2024, 2:15 a.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet/smc: fix connection leak  \n  \nThere's a potential leak issue under following execution sequence :  \n  \nsmc_release      smc_connect_work  \nif (sk-&gt;sk_state == SMC_INIT)  \n     send_clc_confirim  \n tcp_abort();  \n     ...  \n     sk.sk_state = SMC_ACTIVE  \nsmc_close_active  \nswitch(sk-&gt;sk_state) {  \n...  \ncase SMC_ACTIVE:  \n smc_close_final()  \n // then wait peer closed  \n  \nUnfortunately, tcp_abort() may discard CLC CONFIRM messages that are  \nstill in the tcp send buffer, in which case our connection token cannot  \nbe delivered to the server side, which means that we cannot get a  \npassive close message at all. Therefore, it is impossible for the to be  \ndisconnected at all.  \n  \nThis patch tries a very simple way to avoid this issue, once the state  \nhas changed to SMC_ACTIVE after tcp_abort(), we can actively abort the  \nsmc connection, considering that the state is SMC_INIT before  \ntcp_abort(), abandoning the complete disconnection process should not  \ncause too much problem.  \n  \nIn fact, this problem may exist as long as the CLC CONFIRM message is  \nnot received by the server. Whether a timer should be added after  \nsmc_close_final() needs to be discussed in the future. But even so, this  \npatch provides a faster release for connection in above case, it should  \nalso be valuable. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T05:07:58.000000Z"}