In the Linux kernel, the following vulnerability has been resolved:
raw: Fix a data-race around sysctlrawl3mdev_accept.
While reading sysctlrawl3mdevaccept, it can be changed concurrently. Thus, we need to add READONCE() to its reader.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49631.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49631.json"
[
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@46e9c46203fd4676720ddca0fef7eff26826648e",
"signature_type": "Function",
"id": "CVE-2022-49631-0d1e49ad",
"target": {
"file": "include/net/raw.h",
"function": "raw_sk_bound_dev_eq"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc9540ba5b3652c473af7e54892a48cdced87983",
"signature_type": "Line",
"id": "CVE-2022-49631-1342a041",
"target": {
"file": "include/net/raw.h"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dace014928e6e385363032d359a04dee9158af0",
"signature_type": "Function",
"id": "CVE-2022-49631-2e2d22e3",
"target": {
"file": "include/net/raw.h",
"function": "raw_sk_bound_dev_eq"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@46e9c46203fd4676720ddca0fef7eff26826648e",
"signature_type": "Line",
"id": "CVE-2022-49631-40361c90",
"target": {
"file": "include/net/raw.h"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1dace014928e6e385363032d359a04dee9158af0",
"signature_type": "Line",
"id": "CVE-2022-49631-631e98ee",
"target": {
"file": "include/net/raw.h"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@038a87b3e460d2ee579c8b1bd3890d816d6687b1",
"signature_type": "Function",
"id": "CVE-2022-49631-82ea5172",
"target": {
"file": "include/net/raw.h",
"function": "raw_sk_bound_dev_eq"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab5adca2e17d6595f3fc0e25ccb6bcbe2e01ca4f",
"signature_type": "Line",
"id": "CVE-2022-49631-995c8570",
"target": {
"file": "include/net/raw.h"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203088347011246571306246139041650664237",
"125212036905528997128565235578547226439",
"21722630180446384231897973414021156693",
"131691727606655467811560221318413340395"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@038a87b3e460d2ee579c8b1bd3890d816d6687b1",
"signature_type": "Line",
"id": "CVE-2022-49631-9bd72e97",
"target": {
"file": "include/net/raw.h"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc9540ba5b3652c473af7e54892a48cdced87983",
"signature_type": "Function",
"id": "CVE-2022-49631-e8878663",
"target": {
"file": "include/net/raw.h",
"function": "raw_sk_bound_dev_eq"
}
},
{
"deprecated": false,
"signature_version": "v1",
"digest": {
"function_hash": "21235897663829684588037619153882936821",
"length": 291.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ab5adca2e17d6595f3fc0e25ccb6bcbe2e01ca4f",
"signature_type": "Function",
"id": "CVE-2022-49631-ff01df4c",
"target": {
"file": "include/net/raw.h",
"function": "raw_sk_bound_dev_eq"
}
}
]