In the Linux kernel, the following vulnerability has been resolved:
ip: Fix a data-race around sysctlipautobind_reuse.
While reading sysctlipautobindreuse, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49600.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c",
"function": "inet_csk_find_open_port"
},
"id": "CVE-2022-49600-1bf8151a",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0db232765887d9807df8bcb7b6f29b2871539eab",
"digest": {
"function_hash": "189270334892551979074692716810754933239",
"length": 1541.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c",
"function": "inet_csk_find_open_port"
},
"id": "CVE-2022-49600-59133655",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87ceaa199a72c5856d49a030941fabcd5c3928d4",
"digest": {
"function_hash": "189270334892551979074692716810754933239",
"length": 1541.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"id": "CVE-2022-49600-5fc86f4b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87ceaa199a72c5856d49a030941fabcd5c3928d4",
"digest": {
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"id": "CVE-2022-49600-992ea326",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@611ba70e5aca252ef43374dda97ed4cf1c47a07c",
"digest": {
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"id": "CVE-2022-49600-add3a4bf",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa7cdcf9b28d13aac1eeb34b948db8a18e041341",
"digest": {
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
],
"threshold": 0.9
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c",
"function": "inet_csk_find_open_port"
},
"id": "CVE-2022-49600-b04135c1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@611ba70e5aca252ef43374dda97ed4cf1c47a07c",
"digest": {
"function_hash": "189270334892551979074692716810754933239",
"length": 1541.0
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c",
"function": "inet_csk_find_open_port"
},
"id": "CVE-2022-49600-d12387b8",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa7cdcf9b28d13aac1eeb34b948db8a18e041341",
"digest": {
"function_hash": "189270334892551979074692716810754933239",
"length": 1541.0
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"id": "CVE-2022-49600-d829eefa",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0db232765887d9807df8bcb7b6f29b2871539eab",
"digest": {
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49600.json"