CVE-2022-49640

Source
https://cve.org/CVERecord?id=CVE-2022-49640
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49640.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49640
Downstream
Related
Published
2025-02-26T02:23:48.206Z
Modified
2026-04-11T12:44:20.852890Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
sysctl: Fix data races in proc_douintvec_minmax().
Details

In the Linux kernel, the following vulnerability has been resolved:

sysctl: Fix data races in procdouintvecminmax().

A sysctl variable is accessed concurrently, and there is always a chance of data-race. So, all readers and writers need some basic protection to avoid load/store-tearing.

This patch changes procdouintvecminmax() to use READONCE() and WRITEONCE() internally to fix data-races on the sysctl side. For now, procdouintvecminmax() itself is tolerant to a data-race, but we still need to add annotations on the other subsystem's side.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49640.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
61d9b56a89208d8cccd0b4cfec7e6959717e16e3
Fixed
e3a2144b3b6bf9ecafd91087c8b8b48171ec19df
Fixed
40e0477a7371d101c55b69d9c32a7a1ed82ab5ea
Fixed
b60eddf98b9716651069dfda296c91311a7a6293
Fixed
2d3b559df3ed39258737789aae2ae7973d205bc1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49640.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.13.0
Fixed
5.10.132
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.56
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.13

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49640.json"