Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix a data-race around sysctl_fib_sync_mem. While reading sysctl_fib_sync_mem, it can be changed concurrently. So, we need to add READ_ONCE() to avoid a data-race.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.2, < 5.4.207 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/190cd4ff128373271e065afb20f1d2247b3f10c3Patch
- https://git.kernel.org/stable/c/418b191d5f223a8cb6cab09eae1f72c04ba6adf2Patch
- https://git.kernel.org/stable/c/73318c4b7dbd0e781aaababff17376b2894745c0Patch
- https://git.kernel.org/stable/c/7c1acd98fb221dc0d847451b9ab86319f8b9916cPatch
- https://git.kernel.org/stable/c/9be8aac91960ea32fd0e874758c9afee665c57d2Patch
FAQ
What is CVE-2022-49637?
CVE-2022-49637 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix a data-race around sysctl_fib_sync_mem. While reading sysctl_fib_sync_mem, it can be changed concurrently. So, we need t...
How severe is CVE-2022-49637?
CVE-2022-49637 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49637?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.