In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctltcpprobe_threshold.
While reading sysctltcpprobethreshold, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49595.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-01c0e312",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96900fa61777402eb5056269d8000aace33a8b6c",
"digest": {
"function_hash": "140767904609658270680415523828541932086",
"length": 2790.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-0395180c",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f524c3e7f6cdad66b3b6a912cef47b656f8b0de3",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-21d5a139",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b5dc7ad6da1373d3c60d4b869d688f996e5d219",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-26acfb5a",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b04817c94fbd285a967d9b830b274fe9998c9c0b",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-30b130bf",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d452ce36f2d4c402fa3f5275c9677f80166e7fc6",
"digest": {
"function_hash": "330378536810289801553783766977316976139",
"length": 2770.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-3869b32e",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f524c3e7f6cdad66b3b6a912cef47b656f8b0de3",
"digest": {
"function_hash": "33538985139398804637947514611365138968",
"length": 2818.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-5ef04c9b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b04817c94fbd285a967d9b830b274fe9998c9c0b",
"digest": {
"function_hash": "330378536810289801553783766977316976139",
"length": 2770.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-799afab4",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d452ce36f2d4c402fa3f5275c9677f80166e7fc6",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-91016d70",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96900fa61777402eb5056269d8000aace33a8b6c",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-910d751e",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa5fb2cf9393db898772db8cb897ed5fd265eb78",
"digest": {
"function_hash": "302294475524310683573783736763201380696",
"length": 2729.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-965e9258",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b5dc7ad6da1373d3c60d4b869d688f996e5d219",
"digest": {
"function_hash": "107049206241220439461922011221041054345",
"length": 3002.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-9974a0b4",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa5fb2cf9393db898772db8cb897ed5fd265eb78",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-b619c749",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c0aa4175474483d6cf373314343d4e624e882a",
"digest": {
"function_hash": "302294475524310683573783736763201380696",
"length": 2729.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-bee15ea8",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44768749980d53bc01980d9c060f736808d11af0",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtu_probe"
},
"id": "CVE-2022-49595-c2f8402b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44768749980d53bc01980d9c060f736808d11af0",
"digest": {
"function_hash": "11954875365089217374230886804698022513",
"length": 3009.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49595-d9a56f29",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@92c0aa4175474483d6cf373314343d4e624e882a",
"digest": {
"line_hashes": [
"13655800860832916940327781889031710416",
"263390732536030918278761468747025672276",
"132001751987764533838033254548855406336",
"74657513650270255509756789852049983349"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49595.json"