In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctltcpearly_retrans.
While reading sysctltcpearlyretrans, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@83767fe800a311370330d4ec83aa76093b744a80",
"id": "CVE-2022-49573-05ee3c5a",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281752452817101063193814073181094351197",
"222285674343164713855664405043639128601",
"121992670268606654294261791539865631563",
"286602688718076500736233276387759686453"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@11e8b013d16e5db63f8f76acceb5b86964098aaa",
"id": "CVE-2022-49573-08e2bfc4",
"deprecated": false,
"target": {
"function": "tcp_schedule_loss_probe",
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 850.0,
"function_hash": "95309871663881314734043953742822711039"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5975f6376ce90c2c483ae36bf88c9cface4c13b",
"id": "CVE-2022-49573-1f26b124",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281752452817101063193814073181094351197",
"222285674343164713855664405043639128601",
"121992670268606654294261791539865631563",
"286602688718076500736233276387759686453"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@52e65865deb6a36718a463030500f16530eaab74",
"id": "CVE-2022-49573-2e22d4ef",
"deprecated": false,
"target": {
"function": "tcp_schedule_loss_probe",
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 850.0,
"function_hash": "95309871663881314734043953742822711039"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@488d3ad98ef7cddce7054193dbae6b4349c6807d",
"id": "CVE-2022-49573-2f822073",
"deprecated": false,
"target": {
"function": "tcp_schedule_loss_probe",
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 837.0,
"function_hash": "129701659955586002872312578258236151955"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@83767fe800a311370330d4ec83aa76093b744a80",
"id": "CVE-2022-49573-39bbf33d",
"deprecated": false,
"target": {
"function": "tcp_schedule_loss_probe",
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 857.0,
"function_hash": "71815530581406025357490302265878003015"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@488d3ad98ef7cddce7054193dbae6b4349c6807d",
"id": "CVE-2022-49573-3be1c140",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"269560965569239027640590942229046513159",
"113046522830968948035616774438521473033",
"121992670268606654294261791539865631563",
"286602688718076500736233276387759686453"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@52e65865deb6a36718a463030500f16530eaab74",
"id": "CVE-2022-49573-3d9760c9",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281752452817101063193814073181094351197",
"222285674343164713855664405043639128601",
"121992670268606654294261791539865631563",
"286602688718076500736233276387759686453"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5975f6376ce90c2c483ae36bf88c9cface4c13b",
"id": "CVE-2022-49573-7f0f2520",
"deprecated": false,
"target": {
"function": "tcp_schedule_loss_probe",
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 850.0,
"function_hash": "95309871663881314734043953742822711039"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5037ca9e4b169cc9aed0174d658c3d81fdaf8ea5",
"id": "CVE-2022-49573-8ae8f1d1",
"deprecated": false,
"target": {
"function": "tcp_schedule_loss_probe",
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"length": 850.0,
"function_hash": "95309871663881314734043953742822711039"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5037ca9e4b169cc9aed0174d658c3d81fdaf8ea5",
"id": "CVE-2022-49573-be23f835",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281752452817101063193814073181094351197",
"222285674343164713855664405043639128601",
"121992670268606654294261791539865631563",
"286602688718076500736233276387759686453"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@11e8b013d16e5db63f8f76acceb5b86964098aaa",
"id": "CVE-2022-49573-f876ac00",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_output.c"
},
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"281752452817101063193814073181094351197",
"222285674343164713855664405043639128601",
"121992670268606654294261791539865631563",
"286602688718076500736233276387759686453"
]
}
}
]