Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor. While reading sysctl_tcp_mtu_probe_floor, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.4, < 5.4.208 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/033963b220633ed1602d458e7e4ac06afa9fefb2Patch
- https://git.kernel.org/stable/c/8e92d4423615a5257d0d871fc067aa561f597debPatch
- https://git.kernel.org/stable/c/cc36c37f5fe066c4708e623ead96dc8f57224bf5Patch
- https://git.kernel.org/stable/c/d5bece4df6090395f891110ef52a6f82d16685dbPatch
- https://git.kernel.org/stable/c/e2ecbf3f0aa88277d43908c53b99399d55729ff9Patch
FAQ
What is CVE-2022-49594?
CVE-2022-49594 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor. While reading sysctl_tcp_mtu_probe_floor, it can be changed concurrently. ...
How severe is CVE-2022-49594?
CVE-2022-49594 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49594?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.