
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49595 is a vulnerability in the Linux kernel related to a data race condition around the sysctltcpprobe_threshold variable in the TCP implementation. The vulnerability was discovered in the TCP output handling code, specifically in the Path MTU (Maximum Transmission Unit) probing functionality (Kernel Git).
The vulnerability stems from a data race condition where the sysctltcpprobethreshold variable could be concurrently modified while being read. The issue was present in the tcpmtuprobe function within the net/ipv4/tcpoutput.c file. The fix involved adding a READ_ONCE() operation to ensure atomic reading of the variable, preventing potential race conditions during concurrent access (Kernel Git).
The data race condition could potentially lead to inconsistent behavior in TCP's Path MTU Discovery (PMTUD) probing mechanism, which is responsible for determining the optimal packet size for network transmissions.
The vulnerability was fixed by adding proper memory barrier semantics using READONCE() when accessing the sysctltcpprobethreshold variable. The fix was implemented in the Linux kernel through commit 92c0aa4175474483d6cf373314343d4e624e882a (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."