
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49420 affects the Linux kernel, specifically related to a data race condition in the UDP networking code. The vulnerability was discovered in the handling of sk->skbounddev_if field, where UDP sendmsg() performs lockless reads while this field can be modified by another thread (Kernel Git).
The vulnerability involves a race condition in the UDP networking stack where the sk->skbounddevif field is accessed without proper synchronization. The issue was identified by the Kernel Concurrency Sanitizer (KCSAN) which detected a data race between _ip6datagramconnect and udpv6_sendmsg functions. The race condition occurs when one thread writes to the memory location while another performs a concurrent read operation (Kernel Git).
The impact of this vulnerability is considered minor. According to the kernel developer who fixed the issue, the race condition has "minor consequences" and was primarily addressed to avoid KCSAN splats (warnings) for UDP (Kernel Git).
The issue has been fixed by adding proper READONCE() and WRITEONCE() annotations to mark the data race as intentional and ensure proper memory ordering. The fix was implemented in the Linux kernel through patches that modify multiple networking-related files including net/ipv6/datagram.c, net/ipv6/udp.c, and related header files (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."