
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49574 is a data race vulnerability discovered in the Linux kernel's TCP implementation, specifically affecting the sysctltcprecovery mechanism. The vulnerability was identified when it was found that while reading sysctltcprecovery, it could be changed concurrently, leading to potential race conditions (CVE Details).
The vulnerability stems from concurrent access to the sysctltcprecovery variable in the Linux kernel's TCP implementation. The issue specifically affects the tcpinput.c and tcprecovery.c files, where the sysctltcprecovery variable could be read and modified simultaneously without proper synchronization. The fix involved adding READONCE() to the readers of sysctltcp_recovery to ensure atomic operations (Kernel Commit).
The data race condition could potentially affect TCP recovery mechanisms in the Linux kernel, impacting network stability and reliability. The vulnerability specifically affects the RACK (Recent ACKnowledgment) loss detection mechanism, which was introduced by the commit 4f41b1c58a32 'tcp: use RACK to detect losses' (Debian Tracker).
The vulnerability has been patched in various Linux kernel versions. The fix involves adding READONCE() operations to properly handle concurrent access to sysctltcp_recovery. Multiple Linux distributions have released updates containing the fix, including Debian Bullseye (5.10.234-1), Bookworm (6.1.128-1), and Sid/Trixie (6.12.17-1) (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."