U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2022-49020 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net/9p: Fix a potential socket leak in p9_socket_open Both p9_fd_create_tcp() and p9_fd_create_unix() will call p9_socket_open(). If the creation of p9_trans_fd fails, p9_fd_create_tcp() and p9_fd_create_unix() will return an error directly instead of releasing the cscoket, which will result in a socket leak. This patch adds sock_release() to fix the leak issue.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0396227f4daf4792a6a8aaa3b7771dc25c4cd443 Patch 
https://git.kernel.org/stable/c/2d24d91b9f44620824fc37b766f7cae00ca32748 Patch 
https://git.kernel.org/stable/c/8782b32ef867de7981bbe9e86ecb90e92e8780bd Patch 
https://git.kernel.org/stable/c/8b14bd0b500aec1458b51cb621c8e5fab3304260 Patch 
https://git.kernel.org/stable/c/aa08323fe18cb7cf95317ffa2d54ca1de8e74ebd Patch 
https://git.kernel.org/stable/c/dcc14cfd7debe11b825cb077e75d91d2575b4cb8 Patch 
https://git.kernel.org/stable/c/ded893965b895b2dccd3d1436d8d3daffa23ea64 Patch 
https://git.kernel.org/stable/c/e01c1542379fb395e7da53706df598f38905dfbf Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-401 Missing Release of Memory after Effective Lifetime cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2022-49020
NVD Published Date:
10/21/2024
NVD Last Modified:
10/24/2024
Source:
kernel.org