In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix data-races around sysctltcpfastopenblackholetimeout.
While reading sysctltcpfastopenblackholetimeout, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8afa5604e295046c02b79ccf9e2bbbf8d969d60e",
"deprecated": false,
"digest": {
"function_hash": "21646084784467883155012992332366362965",
"length": 556.0
},
"target": {
"function": "tcp_fastopen_active_should_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-0b78ce53",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0dc2f19d8c2636cebda7976b5ea40c6d69f0d891",
"deprecated": false,
"digest": {
"function_hash": "21646084784467883155012992332366362965",
"length": 556.0
},
"target": {
"function": "tcp_fastopen_active_should_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-35eccc5b",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a77a75a0e7f397550ab039f96115103e78dd5c69",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"49660438895561802855098460889039266521",
"261800351637319008124961098085348340996",
"31710608694303092285259897077642201405",
"59296509010544781154201433783082487281",
"203789594312246050690216678149353177326",
"204245439186160735997910145840293360949",
"7065348597620621878573978371877127542",
"269029701255700936286099610705958141558"
]
},
"target": {
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-45aa624f",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@021266ec640c7a4527e6cd4b7349a512b351de1d",
"deprecated": false,
"digest": {
"function_hash": "218771152600015028416958005371879635460",
"length": 343.0
},
"target": {
"function": "tcp_fastopen_active_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-592114c2",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@021266ec640c7a4527e6cd4b7349a512b351de1d",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"49660438895561802855098460889039266521",
"261800351637319008124961098085348340996",
"31710608694303092285259897077642201405",
"59296509010544781154201433783082487281",
"203789594312246050690216678149353177326",
"204245439186160735997910145840293360949",
"7065348597620621878573978371877127542",
"269029701255700936286099610705958141558"
]
},
"target": {
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-8aa72cfc",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8afa5604e295046c02b79ccf9e2bbbf8d969d60e",
"deprecated": false,
"digest": {
"function_hash": "218771152600015028416958005371879635460",
"length": 343.0
},
"target": {
"function": "tcp_fastopen_active_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-8e636058",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0dc2f19d8c2636cebda7976b5ea40c6d69f0d891",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"49660438895561802855098460889039266521",
"261800351637319008124961098085348340996",
"31710608694303092285259897077642201405",
"59296509010544781154201433783082487281",
"203789594312246050690216678149353177326",
"204245439186160735997910145840293360949",
"7065348597620621878573978371877127542",
"269029701255700936286099610705958141558"
]
},
"target": {
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-a7d2a36f",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a77a75a0e7f397550ab039f96115103e78dd5c69",
"deprecated": false,
"digest": {
"function_hash": "218771152600015028416958005371879635460",
"length": 343.0
},
"target": {
"function": "tcp_fastopen_active_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-c55e6e91",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@021266ec640c7a4527e6cd4b7349a512b351de1d",
"deprecated": false,
"digest": {
"function_hash": "21646084784467883155012992332366362965",
"length": 556.0
},
"target": {
"function": "tcp_fastopen_active_should_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-d5a3968d",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a77a75a0e7f397550ab039f96115103e78dd5c69",
"deprecated": false,
"digest": {
"function_hash": "21646084784467883155012992332366362965",
"length": 556.0
},
"target": {
"function": "tcp_fastopen_active_should_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-e532d0ee",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0dc2f19d8c2636cebda7976b5ea40c6d69f0d891",
"deprecated": false,
"digest": {
"function_hash": "218771152600015028416958005371879635460",
"length": 343.0
},
"target": {
"function": "tcp_fastopen_active_disable",
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-e860ac32",
"signature_version": "v1",
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8afa5604e295046c02b79ccf9e2bbbf8d969d60e",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"49660438895561802855098460889039266521",
"261800351637319008124961098085348340996",
"31710608694303092285259897077642201405",
"59296509010544781154201433783082487281",
"203789594312246050690216678149353177326",
"204245439186160735997910145840293360949",
"7065348597620621878573978371877127542",
"269029701255700936286099610705958141558"
]
},
"target": {
"file": "net/ipv4/tcp_fastopen.c"
},
"id": "CVE-2022-49585-f88059ec",
"signature_version": "v1",
"signature_type": "Line"
}
]