CVE-2022-49641
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: sysctl: Fix data races in proc_douintvec(). A sysctl variable is accessed concurrently, and there is always a chance of data-race. So, all readers and writers need some basic protection to avoid load/store-tearing. This patch changes proc_douintvec() to use READ_ONCE() and WRITE_ONCE() internally to fix data-races on the sysctl side. For now, proc_douintvec() itself is tolerant to a data-race, but we still need to add annotations on the other subsystem's side.
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 4.4.24 ≤ 𝑥 < 4.5 |
linux | linux_kernel | 4.7.7 ≤ 𝑥 < 5.10.132 |
linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.56 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.18.13 |
linux | linux_kernel | 5.19:rc1 |
linux | linux_kernel | 5.19:rc2 |
linux | linux_kernel | 5.19:rc3 |
linux | linux_kernel | 5.19:rc4 |
linux | linux_kernel | 5.19:rc5 |
linux | linux_kernel | 5.19:rc6 |
𝑥
= Vulnerable software versions

Debian Releases