CVE-2022-49600

Source
https://cve.org/CVERecord?id=CVE-2022-49600
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49600.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49600
Downstream
Published
2025-02-26T02:23:28.430Z
Modified
2026-04-11T12:44:16.693702Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ip: Fix a data-race around sysctl_ip_autobind_reuse.
Details

In the Linux kernel, the following vulnerability has been resolved:

ip: Fix a data-race around sysctlipautobind_reuse.

While reading sysctlipautobindreuse, it can be changed concurrently. Thus, we need to add READONCE() to its reader.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49600.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4b01a9674231a97553a55456d883f584e948a78d
Fixed
611ba70e5aca252ef43374dda97ed4cf1c47a07c
Fixed
87ceaa199a72c5856d49a030941fabcd5c3928d4
Fixed
fa7cdcf9b28d13aac1eeb34b948db8a18e041341
Fixed
0db232765887d9807df8bcb7b6f29b2871539eab

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49600.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.134
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49600.json"