CVE-2022-49604

Source
https://cve.org/CVERecord?id=CVE-2022-49604
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49604.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49604
Downstream
Related
Published
2025-02-26T02:23:30.387Z
Modified
2026-04-11T12:44:17.577154Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ip: Fix data-races around sysctl_ip_fwd_use_pmtu.
Details

In the Linux kernel, the following vulnerability has been resolved:

ip: Fix data-races around sysctlipfwdusepmtu.

While reading sysctlipfwdusepmtu, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49604.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f87c10a8aa1e82498c42d0335524d6ae7cf5a52b
Fixed
eb15262128b793e4b1d1c4514d3e6d19c3959764
Fixed
7828309df0f89419a9349761a37c7d1b0da45697
Fixed
b96ed5ccb09ae71103023ed13acefb194f609794
Fixed
93fbc06da1d819f3981a7bd7928c3641ea67b364
Fixed
e364b5f6ffbfc457a997ad09a7baa16c19581edc
Fixed
60c158dc7b1f0558f6cadd5b50d0386da0000d50

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49604.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.14.0
Fixed
4.19.254
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.208
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.134
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.58
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.15

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49604.json"