CVE-2022-49602

Source
https://cve.org/CVERecord?id=CVE-2022-49602
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49602.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49602
Downstream
Published
2025-02-26T02:23:29.420Z
Modified
2026-03-12T03:25:28.195721Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ip: Fix a data-race around sysctl_fwmark_reflect.
Details

In the Linux kernel, the following vulnerability has been resolved:

ip: Fix a data-race around sysctlfwmarkreflect.

While reading sysctlfwmarkreflect, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49602.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e110861f86094cd78cc85593b873970092deb43a
Fixed
fc92e3b4bebfdd986ef1d2c5019f236837b0b982
Fixed
5e7a1be3e68deef250ad43cc91f7bb8d7d758b48
Fixed
9096edcf4854289f92252e086cf6e498c7f8c21d
Fixed
25a635a67c830766110410fea88ec4e6ee29684b
Fixed
0ee76fe01ff3c0b4efaa500aecc90d7c8d3a8860
Fixed
dccf8a67f30e18980d13f07006e5a536bbd1e136
Fixed
a475ecc9ad919aa3ebdd4e4a6ee612b793bf74b3
Fixed
85d0b4dbd74b95cc492b1f4e34497d3f894f5d9a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49602.json"