CVE-2022-49577

Source
https://cve.org/CVERecord?id=CVE-2022-49577
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49577.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49577
Downstream
Published
2025-02-26T02:23:17.120Z
Modified
2026-04-11T12:44:15.664430Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
udp: Fix a data-race around sysctl_udp_l3mdev_accept.
Details

In the Linux kernel, the following vulnerability has been resolved:

udp: Fix a data-race around sysctludpl3mdev_accept.

While reading sysctludpl3mdevaccept, it can be changed concurrently. Thus, we need to add READONCE() to its reader.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49577.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
63a6fff353d01da5a22b72670c434bf12fa0e3b8
Fixed
f39b03bd727a8fea62e82f10fe2e0d753b9930ff
Fixed
fcaef69c79ec222e55643e666b80b221e70fa6a8
Fixed
3f2ac2d6511bb0652abf4d7388d65bb9ff1c641c
Fixed
cb0d28934ca10f99c47e2c6f451405d6c954fe48
Fixed
3d72bb4188c708bb16758c60822fc4dda7a95174

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49577.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.11.0
Fixed
5.4.208
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.134
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49577.json"