
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation, identified as CVE-2022-49838. The issue was reported by Zhen Chen and involves improper handling of fragment chunks in the message queue, specifically when all fragment chunks of the current message are pruned (NVD, Wiz).
The vulnerability occurs in the SCTP implementation where the stream->out_curr pointer is not properly cleared when all fragment chunks of the current message are dequeued. While sctp_sched_dequeue_done() normally handles this by setting out_curr to NULL, the issue arises in sctp_prsctp_prune_unsent() where this cleanup is not performed. This leads to a list_del corruption when attempting to access a NULL next pointer (NVD, Red Hat).
The vulnerability can result in a system crash due to list corruption, potentially affecting the stability of systems using the SCTP protocol. The issue manifests as a NULL pointer dereference in the list handling code, which can lead to system instability (NVD).
The fix involves modifying sctp_prsctp_prune_unsent() to properly set out_curr to NULL when the last fragment chunk of the current message is dequeued. This ensures proper cleanup of the message queue state (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."