Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. While reading sysctl_tcp_slow_start_after_idle, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.18, < 4.19.254 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0e3f82a03ec8c3808e87283e12946227415706c9Patch
- https://git.kernel.org/stable/c/369d99c2b89f54473adcf9acdf40ea562b5a6e0ePatch
- https://git.kernel.org/stable/c/3b26e11b07a09b31247688bec61e2925d4a571b6Patch
- https://git.kernel.org/stable/c/41aeba4506f6b70ec7500c6fe202731a4ba29fe5Patch
- https://git.kernel.org/stable/c/4845b5713ab18a1bb6e31d1fbb4d600240b8b691Patch
- https://git.kernel.org/stable/c/68b6f9506747d507c7bfa374d178929b4157e8c6Patch
FAQ
What is CVE-2022-49572?
CVE-2022-49572 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. While reading sysctl_tcp_slow_start_after_idle, it can be changed con...
How severe is CVE-2022-49572?
CVE-2022-49572 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49572?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.