Логотип exploitDog
bind:CVE-2022-49600
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-49600

Количество 5

Количество 5

ubuntu логотип

CVE-2022-49600

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2022-49600

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2022-49600

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2022-49600

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-q7x4-5349-4gcf

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-49600

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
12 месяцев назад
redhat логотип
CVE-2022-49600

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2022-49600

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
12 месяцев назад
debian логотип
CVE-2022-49600

In the Linux kernel, the following vulnerability has been resolved: i ...

CVSS3: 4.7
0%
Низкий
12 месяцев назад
github логотип
GHSA-q7x4-5349-4gcf

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_ip_autobind_reuse. While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
11 месяцев назад

Уязвимостей на страницу