
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been discovered in the Linux Kernel affecting the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The vulnerability (CVE-2022-3567) was disclosed on October 17, 2022, and involves data races around sk->sk_prot that could lead to race conditions (Ubuntu Security, RedHat Security).
The vulnerability stems from data races around sk->sk_prot in the IPv6 implementation. Some functions in inet6_(stream|dgram)_ops access sk->sk_prot without proper synchronization mechanisms like lock_sock() or rtnl_lock(), which can lead to load tearing. The issue was partially addressed in an earlier commit (086d49058cd8) but required additional fixes to fully resolve the race conditions (Kernel Git).
The race condition vulnerability could potentially lead to undesired system behaviors and stability issues. When exploited, it could cause the system to behave unpredictably due to concurrent access to shared resources without proper synchronization (Ubuntu Security).
The vulnerability has been fixed in various Linux kernel versions. Ubuntu has released patches for multiple versions including 5.15.0-56.62 for 22.04 LTS, 5.4.0-135.152 for 20.04 LTS, and 4.15.0-200.211 for 18.04 LTS. Users are advised to update their systems to the patched versions (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."