CVE-2022-49590

4.7 MEDIUM
Published: February 26, 2025 Modified: October 01, 2025

Description

In the Linux kernel, the following vulnerability has been resolved: igmp: Fix data-races around sysctl_igmp_llm_reports. While reading sysctl_igmp_llm_reports, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers. This test can be packed into a helper, so such changes will be in the follow-up series after net is merged into net-next. if (ipv4_is_local_multicast(pmc->multiaddr) && !READ_ONCE(net->ipv4.sysctl_igmp_llm_reports))

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://git.kernel.org/stable/c/1656ecaddf90e2a070ec2d2404cdae3edf80faca
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/260446eb8e5541402b271343a4516f2b33dec1e4
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/46307adceb67bdf2ec38408dd9cebc378a6b5c46
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/473aad9ad57ff760005377e6f45a2ad4210e08ce
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/a84b4afaca2573ed3aed1f8854aefe3ca5a82e72
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/d77969e7d4ccc26bf1f414a39ef35050a83ba6d5
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/ed876e99ccf417b8bd7fd8408ba5e8b008e46cc8
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch
https://git.kernel.org/stable/c/f6da2267e71106474fbc0943dc24928b9cb79119
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Mailing List Patch

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.7 / 10.0
EPSS (Exploit Probability)
0.0%
7th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux