In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctltcpprobe_interval.
While reading sysctltcpprobeinterval, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a85388f1d94a9f8b5a529118a2c5eaa0520d85c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-168c3b8a",
"target": {
"function": "tcp_mtu_check_reprobe",
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"length": 626.0,
"function_hash": "128901892909898168764715463417287903216"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80dabd089086e6553b7acfcff2ec223bdada87a1",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-2318b830",
"target": {
"function": "tcp_mtu_check_reprobe",
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"length": 626.0,
"function_hash": "128901892909898168764715463417287903216"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b3798d3519eda9c409bb0815b0102f27ec42468d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-306ad404",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"147733102373501500600911229235232474882",
"283514495955035102517421814545990448166",
"240785849208430720757008700148010747786",
"188462823404471224562684432480434855519"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@73a11588751a2c13f25d9da8117efc9a79b1843f",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-4d90fe0b",
"target": {
"function": "tcp_mtu_check_reprobe",
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"length": 626.0,
"function_hash": "128901892909898168764715463417287903216"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b14cc8afbbcbc6dce4797913c0b85266b897f541",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-56db72ca",
"target": {
"function": "tcp_mtu_check_reprobe",
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"length": 626.0,
"function_hash": "128901892909898168764715463417287903216"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b14cc8afbbcbc6dce4797913c0b85266b897f541",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-63881540",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"147733102373501500600911229235232474882",
"283514495955035102517421814545990448166",
"240785849208430720757008700148010747786",
"188462823404471224562684432480434855519"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b3798d3519eda9c409bb0815b0102f27ec42468d",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-673822bc",
"target": {
"function": "tcp_mtu_check_reprobe",
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"length": 626.0,
"function_hash": "128901892909898168764715463417287903216"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e6b6f027e2854a51f345a5e3e808d7a88001d4f8",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-7a15d48b",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"147733102373501500600911229235232474882",
"283514495955035102517421814545990448166",
"240785849208430720757008700148010747786",
"188462823404471224562684432480434855519"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c61aede097d350d890fa1edc9521b0072e14a0b8",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-7a5b563a",
"target": {
"function": "tcp_mtu_check_reprobe",
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"length": 626.0,
"function_hash": "128901892909898168764715463417287903216"
},
"signature_type": "Function"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c61aede097d350d890fa1edc9521b0072e14a0b8",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-bef3c087",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"147733102373501500600911229235232474882",
"283514495955035102517421814545990448166",
"240785849208430720757008700148010747786",
"188462823404471224562684432480434855519"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@73a11588751a2c13f25d9da8117efc9a79b1843f",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-d2cef1a4",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"147733102373501500600911229235232474882",
"283514495955035102517421814545990448166",
"240785849208430720757008700148010747786",
"188462823404471224562684432480434855519"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2a85388f1d94a9f8b5a529118a2c5eaa0520d85c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-d5c166d8",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"147733102373501500600911229235232474882",
"283514495955035102517421814545990448166",
"240785849208430720757008700148010747786",
"188462823404471224562684432480434855519"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@80dabd089086e6553b7acfcff2ec223bdada87a1",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-f0367c2f",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"147733102373501500600911229235232474882",
"283514495955035102517421814545990448166",
"240785849208430720757008700148010747786",
"188462823404471224562684432480434855519"
]
},
"signature_type": "Line"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e6b6f027e2854a51f345a5e3e808d7a88001d4f8",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49593-f5467725",
"target": {
"function": "tcp_mtu_check_reprobe",
"file": "net/ipv4/tcp_output.c"
},
"digest": {
"length": 626.0,
"function_hash": "128901892909898168764715463417287903216"
},
"signature_type": "Function"
}
]