In the Linux kernel, the following vulnerability has been resolved:
ip: Fix a data-race around sysctlfwmarkreflect.
While reading sysctlfwmarkreflect, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49602.json",
"cna_assigner": "Linux"
}[
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-047a0384",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fc92e3b4bebfdd986ef1d2c5019f236837b0b982",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-2fd8065b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0ee76fe01ff3c0b4efaa500aecc90d7c8d3a8860",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-746943ad",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@85d0b4dbd74b95cc492b1f4e34497d3f894f5d9a",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-7549a975",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9096edcf4854289f92252e086cf6e498c7f8c21d",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-84bd4e18",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@25a635a67c830766110410fea88ec4e6ee29684b",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-cf9df9ba",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dccf8a67f30e18980d13f07006e5a536bbd1e136",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-d416974b",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a475ecc9ad919aa3ebdd4e4a6ee612b793bf74b3",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "include/net/ip.h"
},
"id": "CVE-2022-49602-dd8e0beb",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e7a1be3e68deef250ad43cc91f7bb8d7d758b48",
"digest": {
"line_hashes": [
"165341308892365370186055056785556432557",
"33610728991783575413826179228391541569",
"134205679143368779214574983885036324228",
"91844089083644935690599813230673943547"
],
"threshold": 0.9
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49602.json"