CVE-2022-49634
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: sysctl: Fix data-races in proc_dou8vec_minmax(). A sysctl variable is accessed concurrently, and there is always a chance of data-race. So, all readers and writers need some basic protection to avoid load/store-tearing. This patch changes proc_dou8vec_minmax() to use READ_ONCE() and WRITE_ONCE() internally to fix data-races on the sysctl side. For now, proc_dou8vec_minmax() itself is tolerant to a data-race, but we still need to add annotations on the other subsystem's side.
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 5.13 ≤ 𝑥 < 5.15.56 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.18.13 |
linux | linux_kernel | 5.19:rc1 |
linux | linux_kernel | 5.19:rc2 |
linux | linux_kernel | 5.19:rc3 |
linux | linux_kernel | 5.19:rc4 |
linux | linux_kernel | 5.19:rc5 |
linux | linux_kernel | 5.19:rc6 |
𝑥
= Vulnerable software versions

Debian Releases