In the Linux kernel, the following vulnerability has been resolved:
tcp: Fix a data-race around sysctltcpecn_fallback.
While reading sysctltcpecnfallback, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49630.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49630.json"
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"275839456084175973972438356882467485920",
"136750756396821367569141099968634974482",
"185630519270864785578119507356303398098",
"61278203958993198705708849789612952598"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ec3d6c2626ee6e1b36b7bd006873a271406ba61",
"signature_type": "Line",
"id": "CVE-2022-49630-06bb6f8c",
"target": {
"file": "net/ipv4/sysctl_net_ipv4.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"302961369771393032584086631015830682188",
"332536203169285569028205306340741302811",
"242705786410773622747687161401063727951",
"165495257679491155722598941030127775370"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bcf7339f2cf70ea4461df6ea045d1aadfabfa11",
"signature_type": "Line",
"id": "CVE-2022-49630-2f496175",
"target": {
"file": "net/ipv4/tcp_output.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "111129580329521027630583752338949795289",
"length": 186.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@12b8d9ca7e678abc48195294494f1815b555d658",
"signature_type": "Function",
"id": "CVE-2022-49630-342b0c0d",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_ecn_clear_syn"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "111129580329521027630583752338949795289",
"length": 186.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ec3d6c2626ee6e1b36b7bd006873a271406ba61",
"signature_type": "Function",
"id": "CVE-2022-49630-6d3d0b85",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_ecn_clear_syn"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "111129580329521027630583752338949795289",
"length": 186.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bcf7339f2cf70ea4461df6ea045d1aadfabfa11",
"signature_type": "Function",
"id": "CVE-2022-49630-89099da6",
"target": {
"file": "net/ipv4/tcp_output.c",
"function": "tcp_ecn_clear_syn"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"275839456084175973972438356882467485920",
"136750756396821367569141099968634974482",
"185630519270864785578119507356303398098",
"61278203958993198705708849789612952598"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bcf7339f2cf70ea4461df6ea045d1aadfabfa11",
"signature_type": "Line",
"id": "CVE-2022-49630-960128bd",
"target": {
"file": "net/ipv4/sysctl_net_ipv4.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"302961369771393032584086631015830682188",
"332536203169285569028205306340741302811",
"242705786410773622747687161401063727951",
"165495257679491155722598941030127775370"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@12b8d9ca7e678abc48195294494f1815b555d658",
"signature_type": "Line",
"id": "CVE-2022-49630-9817f941",
"target": {
"file": "net/ipv4/tcp_output.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"275839456084175973972438356882467485920",
"136750756396821367569141099968634974482",
"185630519270864785578119507356303398098",
"61278203958993198705708849789612952598"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@12b8d9ca7e678abc48195294494f1815b555d658",
"signature_type": "Line",
"id": "CVE-2022-49630-a0824c08",
"target": {
"file": "net/ipv4/sysctl_net_ipv4.c"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"302961369771393032584086631015830682188",
"332536203169285569028205306340741302811",
"242705786410773622747687161401063727951",
"165495257679491155722598941030127775370"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1ec3d6c2626ee6e1b36b7bd006873a271406ba61",
"signature_type": "Line",
"id": "CVE-2022-49630-df5149be",
"target": {
"file": "net/ipv4/tcp_output.c"
}
}
]