First published: Thu Oct 06 2022(Updated: )
A vulnerability was found in the tcp subsystem in the Linux Kernel, due to a data race around icsk->icsk_af_ops. This issue could allow an attacker to leak internal kernel information.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-477.10.1.rt7.274.el8_8 | 0:4.18.0-477.10.1.rt7.274.el8_8 |
redhat/kernel | <0:4.18.0-477.10.1.el8_8 | 0:4.18.0-477.10.1.el8_8 |
redhat/kernel | <0:5.14.0-284.11.1.el9_2 | 0:5.14.0-284.11.1.el9_2 |
redhat/kernel-rt | <0:5.14.0-284.11.1.rt14.296.el9_2 | 0:5.14.0-284.11.1.rt14.296.el9_2 |
redhat/kernel | <6.1 | 6.1 |
Linux Kernel | ||
debian/linux | <=5.10.223-1<=5.10.234-1 | 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-3566 is classified as a problematic vulnerability due to a data race in the Linux Kernel tcp subsystem.
To mitigate CVE-2022-3566, upgrade your Linux Kernel to a fixed version such as 0:4.18.0-477.10.1.rt7.274.el8_8 or newer.
CVE-2022-3566 affects various versions of the Linux Kernel including kernel-rt and standard kernel packages from Red Hat and Debian.
CVE-2022-3566 can potentially allow an attacker to leak internal kernel information due to a data race condition.
Currently, the most effective mitigation for CVE-2022-3566 is to update to a secure version of the Linux Kernel.