CVE-2022-49631

Source
https://cve.org/CVERecord?id=CVE-2022-49631
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49631.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49631
Downstream
Related
Published
2025-02-26T02:23:43.727Z
Modified
2026-04-11T12:44:19.719976Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
raw: Fix a data-race around sysctl_raw_l3mdev_accept.
Details

In the Linux kernel, the following vulnerability has been resolved:

raw: Fix a data-race around sysctlrawl3mdev_accept.

While reading sysctlrawl3mdevaccept, it can be changed concurrently. Thus, we need to add READONCE() to its reader.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49631.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6897445fb194c8ad046df4a13e1ee9f080a5a21e
Fixed
cc9540ba5b3652c473af7e54892a48cdced87983
Fixed
038a87b3e460d2ee579c8b1bd3890d816d6687b1
Fixed
46e9c46203fd4676720ddca0fef7eff26826648e
Fixed
ab5adca2e17d6595f3fc0e25ccb6bcbe2e01ca4f
Fixed
1dace014928e6e385363032d359a04dee9158af0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49631.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.4.207
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.132
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.56
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.13

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49631.json"