In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix data-races around sysctltcpfastopen.
While reading sysctltcpfastopen, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
[
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_fastopen.c",
"function": "tcp_fastopen_no_cookie"
},
"digest": {
"length": 260.0,
"function_hash": "309498834032662363513412197508636411364"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-048dcad0"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp.c",
"function": "tcp_sendmsg_fastopen"
},
"digest": {
"length": 1166.0,
"function_hash": "275253871605398681720410398587942260633"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-142511a6"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_fastopen.c"
},
"digest": {
"line_hashes": [
"151302240333676016239648152834408270220",
"37276928625373218640401206259387629184",
"187540539952759525193006748618225200380",
"28884161977723658330925781388737750077",
"105981043168382513370080410465921876622",
"238667101556763439646771123308962346432",
"60360183449274556811410289910340794805",
"145757581774147898341269713140341765709"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-30873877"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp.c"
},
"digest": {
"line_hashes": [
"321598744160551074888606273082098194818",
"205134294844689995280208425421820541896",
"176111520505776296885910888732839998235",
"266187467213588658395532719527213823818",
"172621996236382071697645097537067494743",
"302052535255064698890866380597873953784",
"333910074537271560191599808113636844451",
"333693166494355229836478263889269965981"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-524ffb87"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp.c",
"function": "do_tcp_setsockopt"
},
"digest": {
"length": 5656.0,
"function_hash": "249295525151540704705405350739854408400"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-7a77a64b"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "net/ipv4/af_inet.c",
"function": "inet_listen"
},
"digest": {
"length": 816.0,
"function_hash": "265732148836341552271385105518766026848"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-b92f5a2f"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "net/ipv4/tcp_fastopen.c",
"function": "tcp_try_fastopen"
},
"digest": {
"length": 1312.0,
"function_hash": "228267209260298633904909358806140514174"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-e5635b82"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "net/ipv4/af_inet.c"
},
"digest": {
"line_hashes": [
"7989584461936001539300835979521622333",
"286978700085300775592222337797841157762",
"333154361429327288081220274809298481086",
"299705842570099155717447543613097005129"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a54213318c43f4009ae158347aa6016e3b9b55a",
"signature_version": "v1",
"id": "CVE-2022-49586-e95f1816"
}
]