In the Linux kernel, the following vulnerability has been resolved:
ip: Fix a data-race around sysctlipautobind_reuse.
While reading sysctlipautobindreuse, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0db232765887d9807df8bcb7b6f29b2871539eab",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-1bf8151a",
"target": {
"function": "inet_csk_find_open_port",
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Function",
"digest": {
"length": 1541.0,
"function_hash": "189270334892551979074692716810754933239"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87ceaa199a72c5856d49a030941fabcd5c3928d4",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-59133655",
"target": {
"function": "inet_csk_find_open_port",
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Function",
"digest": {
"length": 1541.0,
"function_hash": "189270334892551979074692716810754933239"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87ceaa199a72c5856d49a030941fabcd5c3928d4",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-5fc86f4b",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@611ba70e5aca252ef43374dda97ed4cf1c47a07c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-992ea326",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa7cdcf9b28d13aac1eeb34b948db8a18e041341",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-add3a4bf",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@611ba70e5aca252ef43374dda97ed4cf1c47a07c",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-b04135c1",
"target": {
"function": "inet_csk_find_open_port",
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Function",
"digest": {
"length": 1541.0,
"function_hash": "189270334892551979074692716810754933239"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa7cdcf9b28d13aac1eeb34b948db8a18e041341",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-d12387b8",
"target": {
"function": "inet_csk_find_open_port",
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Function",
"digest": {
"length": 1541.0,
"function_hash": "189270334892551979074692716810754933239"
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0db232765887d9807df8bcb7b6f29b2871539eab",
"signature_version": "v1",
"deprecated": false,
"id": "CVE-2022-49600-d829eefa",
"target": {
"file": "net/ipv4/inet_connection_sock.c"
},
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"299157787616315756658265019447827480068",
"202695080205590764925712132559626708902",
"23763212907824145940604854228457077636",
"101774548372146451432774959014696924288"
]
}
}
]