CVE-2022-49596

Source
https://cve.org/CVERecord?id=CVE-2022-49596
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49596.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49596
Downstream
Published
2025-02-26T02:23:26.521Z
Modified
2026-03-20T12:24:40.292557Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
tcp: Fix data-races around sysctl_tcp_min_snd_mss.
Details

In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctltcpminsndmss.

While reading sysctltcpminsndmss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49596.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5f3e2bf008c2221478101ee72f5cb4654b9fc363
Fixed
fdb96b69f5909ffcdd6f1e0902219fc6d7689ff7
Fixed
97992e8feff33b3ae154a113ec398546bbacda80
Fixed
0fc9357282df055e30990b29f4b7afa53ab42cdb
Fixed
0d8a39feb58910a7f7746b1770ee5578cc551fe6
Fixed
78eb166cdefcc3221c8c7c1e2d514e91a2eb5014
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
6b7e7997ad3505db7de85ff12276fc84659481d3
Last affected
e757d052f3b8ce739d068a1e890643376c16b7a9
Last affected
8e39cbc03dafa3731d22533f869bf326c0e6e6f8
Last affected
cd6f35b8421ff20365ff711c0ac7647fd70e9af7
Last affected
7f9f8a37e563c67b24ccd57da1d541a95538e8d9
Last affected
2efabe3e1491f10bf3cf82ae1a371755ba054a1b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49596.json"