Логотип exploitDog
bind:CVE-2022-49595
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-49595

Количество 5

Количество 5

ubuntu логотип

CVE-2022-49595

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2022-49595

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2022-49595

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2022-49595

12 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: t ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-9hw5-f93p-c5p6

11 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-49595

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
12 месяцев назад
redhat логотип
CVE-2022-49595

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2022-49595

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
12 месяцев назад
debian логотип
CVE-2022-49595

In the Linux kernel, the following vulnerability has been resolved: t ...

CVSS3: 4.7
0%
Низкий
12 месяцев назад
github логотип
GHSA-9hw5-f93p-c5p6

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

CVSS3: 4.7
0%
Низкий
11 месяцев назад

Уязвимостей на страницу