Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy. While reading sysctl_fib_multipath_hash_policy, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.12, < 5.15.58 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/21fb844bc1dc1461f5038d655aa1a14f39e13049Patch
- https://git.kernel.org/stable/c/7998c12a08c97cc26660532c9f90a34bd7d8da5aPatch
- https://git.kernel.org/stable/c/918ee6592ab9a2ff5316d06cfd4aaef60ccabec6Patch
FAQ
What is CVE-2022-49579?
CVE-2022-49579 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy. While reading sysctl_fib_multipath_hash_policy, it can be changed co...
How severe is CVE-2022-49579?
CVE-2022-49579 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49579?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.