CVE-2022-49598

Source
https://cve.org/CVERecord?id=CVE-2022-49598
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49598.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49598
Downstream
Published
2025-02-26T02:23:27.487Z
Modified
2026-04-11T12:44:17.741844Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
tcp: Fix data-races around sysctl_tcp_mtu_probing.
Details

In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctltcpmtu_probing.

While reading sysctltcpmtuprobing, it can be changed concurrently. Thus, we need to add READONCE() to its readers.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49598.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5d424d5a674f782d0659a3b66d951f412901faee
Fixed
7e8fc428a7f680f1c4994a40e52d7f95a9a93038
Fixed
f966773e13cdd3f12baa90071b7b660f6c633ccb
Fixed
77a04845f0d28a3561494a5f3121488470a968a4
Fixed
aabe9438fdfe004e021d5a206227ec105dbe2416
Fixed
b0920ca09d9ce19980c8391b9002455baa9c1417
Fixed
f47d00e077e7d61baf69e46dde3210c886360207

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49598.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.17
Fixed
4.19.254
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.208
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.134
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49598.json"