๐Ÿ” CVE Alert

CVE-2022-49957

UNKNOWN 0.0

kcm: fix strp_init() order and cleanup

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: kcm: fix strp_init() order and cleanup strp_init() is called just a few lines above this csk->sk_user_data check, it also initializes strp->work etc., therefore, it is unnecessary to call strp_done() to cancel the freshly initialized work. And if sk_user_data is already used by KCM, psock->strp should not be touched, particularly strp->work state, so we need to move strp_init() after the csk->sk_user_data check. This also makes a lockdep warning reported by syzbot go away.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 18, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
44890e9ff771ef11777b2d1ebf8589255eb12502 < 473f394953216614087f4179e55cdf0cf616a13b e5571240236c5652f3e079b1d5866716a7ad819c < a8a0c321319ad64a5427d6172cd9c23b4d6ca1e8 e5571240236c5652f3e079b1d5866716a7ad819c < 0946ff31d1a8778787bf6708beb20f38715267cc e5571240236c5652f3e079b1d5866716a7ad819c < 1b6666964ca1de93a7bf06e122bcf3616dbd33a9 e5571240236c5652f3e079b1d5866716a7ad819c < 55fb8c3baa8071c5d533a9ad48624e44e2a04ef5 e5571240236c5652f3e079b1d5866716a7ad819c < f865976baa85915c7672f351b74d5974b93215f6 e5571240236c5652f3e079b1d5866716a7ad819c < 8fc29ff3910f3af08a7c40a75d436b5720efe2bf 085cbbda4b4cc7dd2ba63806346881c2c2e10107 383250363daf01eb7aa3728c09ef8a4f6d8a3252 19042316b9e12c93bf334a04d4dd7a4e846c7311
Linux / Linux
4.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/473f394953216614087f4179e55cdf0cf616a13b git.kernel.org: https://git.kernel.org/stable/c/a8a0c321319ad64a5427d6172cd9c23b4d6ca1e8 git.kernel.org: https://git.kernel.org/stable/c/0946ff31d1a8778787bf6708beb20f38715267cc git.kernel.org: https://git.kernel.org/stable/c/1b6666964ca1de93a7bf06e122bcf3616dbd33a9 git.kernel.org: https://git.kernel.org/stable/c/55fb8c3baa8071c5d533a9ad48624e44e2a04ef5 git.kernel.org: https://git.kernel.org/stable/c/f865976baa85915c7672f351b74d5974b93215f6 git.kernel.org: https://git.kernel.org/stable/c/8fc29ff3910f3af08a7c40a75d436b5720efe2bf