CVE-2022-49601

Source
https://cve.org/CVERecord?id=CVE-2022-49601
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49601.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49601
Downstream
Published
2025-02-26T02:23:28.939Z
Modified
2026-03-20T12:22:27.819226Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept.
Details

In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Fix a data-race around sysctltcpfwmark_accept.

While reading sysctltcpfwmarkaccept, it can be changed concurrently. Thus, we need to add READONCE() to its reader.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49601.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
84f39b08d7868ce10eeaf640627cb89777f0ae93
Fixed
13207f9485b5de68decf296ceb0046f5eabb2485
Fixed
45fc82706a97242539d6b841ddd7a077ec20757b
Fixed
abf70de2ec026ae8d7da4e79bec61888a880e00b
Fixed
a7386602a2fe2f6192477e8ede291a815da09d81
Fixed
d4f65615db7fca3df9f7e79eadf937e6ddb03c54
Fixed
bf3134feffe61b7a0e21f60a04743f8da0958b53
Fixed
526d8cf8824f613c72dba2155542295e70135f62
Fixed
1a0008f9df59451d0a17806c1ee1a19857032fa8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49601.json"