Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ip: Fix data-races around sysctl_ip_prot_sock. sysctl_ip_prot_sock is accessed concurrently, and there is always a chance of data-race. So, all readers and writers need some basic protection to avoid load/store-tearing.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.11, < 5.10.134 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/95724fe897a4ecf2be51452ef96e818568071664Patch
- https://git.kernel.org/stable/c/9add240f76af6d141d2eebd3a1558a0e503a993dPatch
- https://git.kernel.org/stable/c/9b55c20f83369dd54541d9ddbe3a018a8377f451Patch
- https://git.kernel.org/stable/c/ef699813d99cc29e6e25c9f6da7766526cc8bd6ePatch
FAQ
What is CVE-2022-49578?
CVE-2022-49578 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ip: Fix data-races around sysctl_ip_prot_sock. sysctl_ip_prot_sock is accessed concurrently, and there is always a chance of data-...
How severe is CVE-2022-49578?
CVE-2022-49578 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49578?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.