{"id":"CVE-2022-49601","summary":"tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept.","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept.\n\nWhile reading sysctl_tcp_fwmark_accept, it can be changed concurrently.\nThus, we need to add READ_ONCE() to its reader.","modified":"2026-04-02T08:27:46.019769Z","published":"2025-02-26T02:23:28.939Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49601.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/13207f9485b5de68decf296ceb0046f5eabb2485"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1a0008f9df59451d0a17806c1ee1a19857032fa8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/45fc82706a97242539d6b841ddd7a077ec20757b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/526d8cf8824f613c72dba2155542295e70135f62"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a7386602a2fe2f6192477e8ede291a815da09d81"},{"type":"WEB","url":"https://git.kernel.org/stable/c/abf70de2ec026ae8d7da4e79bec61888a880e00b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf3134feffe61b7a0e21f60a04743f8da0958b53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d4f65615db7fca3df9f7e79eadf937e6ddb03c54"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49601.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49601"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"84f39b08d7868ce10eeaf640627cb89777f0ae93"},{"fixed":"13207f9485b5de68decf296ceb0046f5eabb2485"},{"fixed":"45fc82706a97242539d6b841ddd7a077ec20757b"},{"fixed":"abf70de2ec026ae8d7da4e79bec61888a880e00b"},{"fixed":"a7386602a2fe2f6192477e8ede291a815da09d81"},{"fixed":"d4f65615db7fca3df9f7e79eadf937e6ddb03c54"},{"fixed":"bf3134feffe61b7a0e21f60a04743f8da0958b53"},{"fixed":"526d8cf8824f613c72dba2155542295e70135f62"},{"fixed":"1a0008f9df59451d0a17806c1ee1a19857032fa8"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49601.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}