CVE-2022-49344
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix a data-race in unix_dgram_peer_wake_me(). unix_dgram_poll() calls unix_dgram_peer_wake_me() without `other`'s lock held and check if its receive queue is full. Here we need to use unix_recvq_full_lockless() instead of unix_recvq_full(), otherwise KCSAN will report a data-race.
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 3.2.75 ≤ 𝑥 < 3.3 |
linux | linux_kernel | 3.4.111 ≤ 𝑥 < 3.5 |
linux | linux_kernel | 3.10.95 ≤ 𝑥 < 3.11 |
linux | linux_kernel | 3.12.52 ≤ 𝑥 < 3.13 |
linux | linux_kernel | 3.14.59 ≤ 𝑥 < 3.15 |
linux | linux_kernel | 3.18.26 ≤ 𝑥 < 3.19 |
linux | linux_kernel | 4.1.15 ≤ 𝑥 < 4.2 |
linux | linux_kernel | 4.2.8 ≤ 𝑥 < 4.3 |
linux | linux_kernel | 4.3.3 ≤ 𝑥 < 4.19.247 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.198 |
linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.122 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.47 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.15 |
linux | linux_kernel | 5.18 ≤ 𝑥 < 5.18.4 |
linux | linux_kernel | 5.19:rc1 |
𝑥
= Vulnerable software versions

Debian Releases
References