CVE-2022-49604

Source
https://cve.org/CVERecord?id=CVE-2022-49604
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49604.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49604
Downstream
Related
Published
2025-02-26T02:23:30.387Z
Modified
2026-03-20T12:22:27.515597Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ip: Fix data-races around sysctl_ip_fwd_use_pmtu.
Details

In the Linux kernel, the following vulnerability has been resolved:

ip: Fix data-races around sysctlipfwdusepmtu.

While reading sysctlipfwdusepmtu, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49604.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f87c10a8aa1e82498c42d0335524d6ae7cf5a52b
Fixed
eb15262128b793e4b1d1c4514d3e6d19c3959764
Fixed
7828309df0f89419a9349761a37c7d1b0da45697
Fixed
b96ed5ccb09ae71103023ed13acefb194f609794
Fixed
93fbc06da1d819f3981a7bd7928c3641ea67b364
Fixed
e364b5f6ffbfc457a997ad09a7baa16c19581edc
Fixed
60c158dc7b1f0558f6cadd5b50d0386da0000d50

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49604.json"