Unrated severityNVD Advisory· Published Jun 18, 2025
kcm: fix strp_init() order and cleanup
CVE-2022-49957
Description
In the Linux kernel, the following vulnerability has been resolved:
kcm: fix strp_init() order and cleanup
strp_init() is called just a few lines above this csk->sk_user_data check, it also initializes strp->work etc., therefore, it is unnecessary to call strp_done() to cancel the freshly initialized work.
And if sk_user_data is already used by KCM, psock->strp should not be touched, particularly strp->work state, so we need to move strp_init() after the csk->sk_user_data check.
This also makes a lockdep warning reported by syzbot go away.
Affected products
91- osv-coords89 versionspkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-default-base&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/kernel-default-base&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/kernel-default&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP5_Update_28&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/kernel-syms&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_70&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 5.14.21-150400.24.170.2+ 88 more
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150500.55.113.1.150500.6.53.1
- (no CPE)range: < 5.14.21-150500.55.113.1.150500.6.53.1
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150500.55.113.1.150500.6.53.1
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150500.55.113.1.150500.6.53.1
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150500.55.113.1.150500.6.53.1
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150400.24.170.2.150400.24.86.2
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 4.12.14-122.266.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 4.12.14-122.266.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 4.12.14-122.266.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 1-150500.11.3.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.15.124.1
- (no CPE)range: < 5.14.21-150400.15.124.1
- (no CPE)range: < 5.14.21-150500.13.100.2
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 4.12.14-122.266.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 4.12.14-122.266.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150400.15.124.1
- (no CPE)range: < 5.14.21-150400.15.124.1
- (no CPE)range: < 5.14.21-150500.13.100.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 4.12.14-122.266.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 4.12.14-122.266.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150400.24.170.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 5.14.21-150500.55.113.1
- (no CPE)range: < 5.14.21-150400.24.170.2
- (no CPE)range: < 1-8.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/0946ff31d1a8778787bf6708beb20f38715267ccmitre
- git.kernel.org/stable/c/1b6666964ca1de93a7bf06e122bcf3616dbd33a9mitre
- git.kernel.org/stable/c/473f394953216614087f4179e55cdf0cf616a13bmitre
- git.kernel.org/stable/c/55fb8c3baa8071c5d533a9ad48624e44e2a04ef5mitre
- git.kernel.org/stable/c/8fc29ff3910f3af08a7c40a75d436b5720efe2bfmitre
- git.kernel.org/stable/c/a8a0c321319ad64a5427d6172cd9c23b4d6ca1e8mitre
- git.kernel.org/stable/c/f865976baa85915c7672f351b74d5974b93215f6mitre
News mentions
0No linked articles in our index yet.