In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix data-races around sysctltcpminsndmss.
While reading sysctltcpminsndmss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49596.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_timer.c",
"function": "tcp_mtu_probing"
},
"id": "CVE-2022-49596-82a82b05",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78eb166cdefcc3221c8c7c1e2d514e91a2eb5014",
"digest": {
"function_hash": "281566584498505674933216772257791713072",
"length": 703.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_timer.c"
},
"id": "CVE-2022-49596-8a4d7abc",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97992e8feff33b3ae154a113ec398546bbacda80",
"digest": {
"line_hashes": [
"187761280724106044984142817070110272630",
"189135921531724722705149455037123416471",
"44459688161269679992615407882585783812",
"182942021828200825053381122753652270053"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49596-9dc755c3",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97992e8feff33b3ae154a113ec398546bbacda80",
"digest": {
"line_hashes": [
"207300819999831170519326092736113790895",
"32318546316171028026716235241305808219",
"241493132409694791187069722307328231093",
"239716611054884832126573610689266372235"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_timer.c",
"function": "tcp_mtu_probing"
},
"id": "CVE-2022-49596-bdbbf0ae",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97992e8feff33b3ae154a113ec398546bbacda80",
"digest": {
"function_hash": "281566584498505674933216772257791713072",
"length": 703.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c"
},
"id": "CVE-2022-49596-bddd8ff2",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78eb166cdefcc3221c8c7c1e2d514e91a2eb5014",
"digest": {
"line_hashes": [
"207300819999831170519326092736113790895",
"32318546316171028026716235241305808219",
"241493132409694791187069722307328231093",
"239716611054884832126573610689266372235"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "__tcp_mtu_to_mss"
},
"id": "CVE-2022-49596-ea5629a6",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@97992e8feff33b3ae154a113ec398546bbacda80",
"digest": {
"function_hash": "103761388369609720298385660264538051514",
"length": 604.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "__tcp_mtu_to_mss"
},
"id": "CVE-2022-49596-edd5e898",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78eb166cdefcc3221c8c7c1e2d514e91a2eb5014",
"digest": {
"function_hash": "103761388369609720298385660264538051514",
"length": 604.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/tcp_timer.c"
},
"id": "CVE-2022-49596-f2e6db63",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@78eb166cdefcc3221c8c7c1e2d514e91a2eb5014",
"digest": {
"line_hashes": [
"187761280724106044984142817070110272630",
"189135921531724722705149455037123416471",
"44459688161269679992615407882585783812",
"182942021828200825053381122753652270053"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49596.json"