In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctltcpprobe_threshold.
While reading sysctltcpprobethreshold, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "140767904609658270680415523828541932086",
"length": 2790.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-01c0e312",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96900fa61777402eb5056269d8000aace33a8b6c",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-0395180c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f524c3e7f6cdad66b3b6a912cef47b656f8b0de3",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-21d5a139",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b5dc7ad6da1373d3c60d4b869d688f996e5d219",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-26acfb5a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b04817c94fbd285a967d9b830b274fe9998c9c0b",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "330378536810289801553783766977316976139",
"length": 2770.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-30b130bf",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d452ce36f2d4c402fa3f5275c9677f80166e7fc6",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "33538985139398804637947514611365138968",
"length": 2818.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-3869b32e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f524c3e7f6cdad66b3b6a912cef47b656f8b0de3",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "330378536810289801553783766977316976139",
"length": 2770.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-5ef04c9b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b04817c94fbd285a967d9b830b274fe9998c9c0b",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-799afab4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d452ce36f2d4c402fa3f5275c9677f80166e7fc6",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-91016d70",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96900fa61777402eb5056269d8000aace33a8b6c",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "302294475524310683573783736763201380696",
"length": 2729.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-910d751e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa5fb2cf9393db898772db8cb897ed5fd265eb78",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "107049206241220439461922011221041054345",
"length": 3002.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-965e9258",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b5dc7ad6da1373d3c60d4b869d688f996e5d219",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-9974a0b4",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa5fb2cf9393db898772db8cb897ed5fd265eb78",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "302294475524310683573783736763201380696",
"length": 2729.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-b619c749",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c0aa4175474483d6cf373314343d4e624e882a",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-bee15ea8",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44768749980d53bc01980d9c060f736808d11af0",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "11954875365089217374230886804698022513",
"length": 3009.0
},
"target": {
"function": "tcp_mtu_probe",
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-c2f8402b",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44768749980d53bc01980d9c060f736808d11af0",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-d9a56f29",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c0aa4175474483d6cf373314343d4e624e882a",
"signature_type": "Line"
}
]