In the Linux kernel, the following vulnerability has been resolved:
raw: Fix a data-race around sysctlrawl3mdev_accept.
While reading sysctlrawl3mdevaccept, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"target": {
"function": "raw_sk_bound_dev_eq",
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-0d1e49ad",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@46e9c46203fd4676720ddca0fef7eff26826648e",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
],
"threshold": 0.9
},
"target": {
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-1342a041",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc9540ba5b3652c473af7e54892a48cdced87983",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"target": {
"function": "raw_sk_bound_dev_eq",
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-2e2d22e3",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dace014928e6e385363032d359a04dee9158af0",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
],
"threshold": 0.9
},
"target": {
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-40361c90",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@46e9c46203fd4676720ddca0fef7eff26826648e",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
],
"threshold": 0.9
},
"target": {
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-631e98ee",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dace014928e6e385363032d359a04dee9158af0",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"target": {
"function": "raw_sk_bound_dev_eq",
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-82ea5172",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@038a87b3e460d2ee579c8b1bd3890d816d6687b1",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
],
"threshold": 0.9
},
"target": {
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-995c8570",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab5adca2e17d6595f3fc0e25ccb6bcbe2e01ca4f",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
],
"threshold": 0.9
},
"target": {
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-9bd72e97",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@038a87b3e460d2ee579c8b1bd3890d816d6687b1",
"signature_type": "Line"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"target": {
"function": "raw_sk_bound_dev_eq",
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-e8878663",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc9540ba5b3652c473af7e54892a48cdced87983",
"signature_type": "Function"
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"target": {
"function": "raw_sk_bound_dev_eq",
"file": "include/net/raw.h"
},
"id": "CVE-2022-49631-ff01df4c",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab5adca2e17d6595f3fc0e25ccb6bcbe2e01ca4f",
"signature_type": "Function"
}
]