CVE-2022-49580

Source
https://cve.org/CVERecord?id=CVE-2022-49580
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49580.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49580
Downstream
Published
2025-02-26T02:23:18.667Z
Modified
2026-03-20T12:22:27.481205Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh.
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix a data-race around sysctlfibmultipathuseneigh.

While reading sysctlfibmultipathuseneigh, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49580.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a6db4494d218c2e559173661ee972e048dc04fdd
Fixed
6727f39e99e0f545d815edebb6c94228485427ec
Fixed
e045d672ba06e1d35bacb56374d350de0ac99066
Fixed
b8d345db03b4deffb4f04219a51d3b1e94171b76
Fixed
14e996577ed2799a1ed6ffeb71c76d63acb28444
Fixed
87507bcb4f5de16bb419e9509d874f4db6c0ad0f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49580.json"