CVE-2022-49595

Source
https://cve.org/CVERecord?id=CVE-2022-49595
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49595.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49595
Downstream
Published
2025-02-26T02:23:26.012Z
Modified
2026-04-11T12:44:16.949145Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
tcp: Fix a data-race around sysctl_tcp_probe_threshold.
Details

In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctltcpprobe_threshold.

While reading sysctltcpprobethreshold, it can be changed concurrently. Thus, we need to add READONCE() to its reader.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49595.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6b58e0a5f32dedb609438bb9c9c82aa6e23381f2
Fixed
9b5dc7ad6da1373d3c60d4b869d688f996e5d219
Fixed
44768749980d53bc01980d9c060f736808d11af0
Fixed
96900fa61777402eb5056269d8000aace33a8b6c
Fixed
b04817c94fbd285a967d9b830b274fe9998c9c0b
Fixed
d452ce36f2d4c402fa3f5275c9677f80166e7fc6
Fixed
f524c3e7f6cdad66b3b6a912cef47b656f8b0de3
Fixed
fa5fb2cf9393db898772db8cb897ed5fd265eb78
Fixed
92c0aa4175474483d6cf373314343d4e624e882a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49595.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.0
Fixed
4.9.325
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.290
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.254
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.208
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.134
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49595.json"