In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix data-races around sysctltcpbase_mss.
While reading sysctltcpbasemss, it can be changed concurrently. Thus, we need to add READONCE() to its readers.
[
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"200146400492931999824187523689225299862",
"154694329680301302860553898391196382030",
"230498178563537068496823570722460590517",
"277911492736275627522683479836084234025"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30b73edc1d2459ba2c71cb58fbf84a1a6e640fbf",
"signature_version": "v1",
"id": "CVE-2022-49597-2c0d9d9e"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"19928952931534918452493558900249231506",
"69310773515518323902106458435777561412",
"321109526370267483678190780855064978324",
"158318422339513667806142199936775804035"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_timer.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30b73edc1d2459ba2c71cb58fbf84a1a6e640fbf",
"signature_version": "v1",
"id": "CVE-2022-49597-78bf8636"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 690.0,
"function_hash": "125761541567742855751679507863154212192"
},
"target": {
"file": "net/ipv4/tcp_timer.c",
"function": "tcp_mtu_probing"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30b73edc1d2459ba2c71cb58fbf84a1a6e640fbf",
"signature_version": "v1",
"id": "CVE-2022-49597-d8b693cf"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 557.0,
"function_hash": "329401741354965239478628976887298730238"
},
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_mtup_init"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30b73edc1d2459ba2c71cb58fbf84a1a6e640fbf",
"signature_version": "v1",
"id": "CVE-2022-49597-ea4a3feb"
}
]