CVE-2022-49603

Source
https://cve.org/CVERecord?id=CVE-2022-49603
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49603.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49603
Downstream
Related
Published
2025-02-26T02:23:29.912Z
Modified
2026-04-11T12:44:17.923230Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ip: Fix data-races around sysctl_ip_fwd_update_priority.
Details

In the Linux kernel, the following vulnerability has been resolved:

ip: Fix data-races around sysctlipfwdupdatepriority.

While reading sysctlipfwdupdatepriority, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49603.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
432e05d328921c68c35bfdeff7d7b7400b8e3d1a
Fixed
11038fa781ab916535c53351537b22d6d405667d
Fixed
351f81f7d7185d18a9ff76f8f8c2fa8c4eea563b
Fixed
bcc03369d3277ae075ed421f0c8bf4adb5e65b74
Fixed
7bf9e18d9a5e99e3c83482973557e9f047b051e7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49603.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.19.0
Fixed
5.10.134
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49603.json"