In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctltcpecn_fallback.
While reading sysctltcpecnfallback, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
[
{
"id": "CVE-2022-49630-06bb6f8c",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"275839456084175973972438356882467485920",
"136750756396821367569141099968634974482",
"185630519270864785578119507356303398098",
"61278203958993198705708849789612952598"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/sysctl_net_ipv4.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ec3d6c2626ee6e1b36b7bd006873a271406ba61",
"deprecated": false
},
{
"id": "CVE-2022-49630-2f496175",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"302961369771393032584086631015830682188",
"332536203169285569028205306340741302811",
"242705786410773622747687161401063727951",
"165495257679491155722598941030127775370"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bcf7339f2cf70ea4461df6ea045d1aadfabfa11",
"deprecated": false
},
{
"id": "CVE-2022-49630-342b0c0d",
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"length": 186.0,
"function_hash": "111129580329521027630583752338949795289"
},
"target": {
"function": "tcp_ecn_clear_syn",
"file": "net/ipv4/tcp_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@12b8d9ca7e678abc48195294494f1815b555d658",
"deprecated": false
},
{
"id": "CVE-2022-49630-6d3d0b85",
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"length": 186.0,
"function_hash": "111129580329521027630583752338949795289"
},
"target": {
"function": "tcp_ecn_clear_syn",
"file": "net/ipv4/tcp_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ec3d6c2626ee6e1b36b7bd006873a271406ba61",
"deprecated": false
},
{
"id": "CVE-2022-49630-89099da6",
"signature_type": "Function",
"signature_version": "v1",
"digest": {
"length": 186.0,
"function_hash": "111129580329521027630583752338949795289"
},
"target": {
"function": "tcp_ecn_clear_syn",
"file": "net/ipv4/tcp_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bcf7339f2cf70ea4461df6ea045d1aadfabfa11",
"deprecated": false
},
{
"id": "CVE-2022-49630-960128bd",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"275839456084175973972438356882467485920",
"136750756396821367569141099968634974482",
"185630519270864785578119507356303398098",
"61278203958993198705708849789612952598"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/sysctl_net_ipv4.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bcf7339f2cf70ea4461df6ea045d1aadfabfa11",
"deprecated": false
},
{
"id": "CVE-2022-49630-9817f941",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"302961369771393032584086631015830682188",
"332536203169285569028205306340741302811",
"242705786410773622747687161401063727951",
"165495257679491155722598941030127775370"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@12b8d9ca7e678abc48195294494f1815b555d658",
"deprecated": false
},
{
"id": "CVE-2022-49630-a0824c08",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"275839456084175973972438356882467485920",
"136750756396821367569141099968634974482",
"185630519270864785578119507356303398098",
"61278203958993198705708849789612952598"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/sysctl_net_ipv4.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@12b8d9ca7e678abc48195294494f1815b555d658",
"deprecated": false
},
{
"id": "CVE-2022-49630-df5149be",
"signature_type": "Line",
"signature_version": "v1",
"digest": {
"line_hashes": [
"302961369771393032584086631015830682188",
"332536203169285569028205306340741302811",
"242705786410773622747687161401063727951",
"165495257679491155722598941030127775370"
],
"threshold": 0.9
},
"target": {
"file": "net/ipv4/tcp_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ec3d6c2626ee6e1b36b7bd006873a271406ba61",
"deprecated": false
}
]