CVE-2022-49639

Source
https://cve.org/CVERecord?id=CVE-2022-49639
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49639.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49639
Downstream
Published
2025-02-26T02:23:47.731Z
Modified
2026-04-11T12:44:19.826976Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
cipso: Fix data-races around sysctl.
Details

In the Linux kernel, the following vulnerability has been resolved:

cipso: Fix data-races around sysctl.

While reading cipso sysctl variables, they can be changed concurrently. So, we need to add READ_ONCE() to avoid data-races.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49639.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
446fda4f26822b2d42ab3396aafcedf38a9ff2b6
Fixed
2764f82bbc158d106693ae3ced3675cf4b963b35
Fixed
c321e99d2725d11f7e6a4ebd9ce752259f0bae81
Fixed
ca26ca5e2f3eeb3e6fe699cd6effa3b4b2aa8698
Fixed
0e41a0f73ccb9be112a80bde3804a771633caaef
Fixed
fe2a35fa2c4f9c8ce5ef970eb927031387f9446a
Fixed
07b0caf8aeb9b82e6ecc6c292a3e47c7fcdb1148
Fixed
59e26906b89cc35bb54476498772b45cbc32323f
Fixed
dd44f04b9214adb68ef5684ae87a81ba03632250

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49639.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.19
Fixed
4.9.324
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.289
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.253
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.207
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.132
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.56
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.13

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49639.json"