CVE-2022-49578

Source
https://cve.org/CVERecord?id=CVE-2022-49578
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49578.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49578
Downstream
Related
Published
2025-02-26T02:23:17.659Z
Modified
2026-04-11T11:56:52.864690Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ip: Fix data-races around sysctl_ip_prot_sock.
Details

In the Linux kernel, the following vulnerability has been resolved:

ip: Fix data-races around sysctlipprot_sock.

sysctlipprot_sock is accessed concurrently, and there is always a chance of data-race. So, all readers and writers need some basic protection to avoid load/store-tearing.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49578.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4548b683b78137f8eadeb312b94e20bb0d4a7141
Fixed
9add240f76af6d141d2eebd3a1558a0e503a993d
Fixed
95724fe897a4ecf2be51452ef96e818568071664
Fixed
ef699813d99cc29e6e25c9f6da7766526cc8bd6e
Fixed
9b55c20f83369dd54541d9ddbe3a018a8377f451

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49578.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.11.0
Fixed
5.10.134
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49578.json"