In the Linux kernel, the following vulnerability has been resolved:
icmp: Fix data-races around sysctl.
While reading icmp sysctl variables, they can be changed concurrently. So, we need to add READ_ONCE() to avoid data-races.
[
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1740e5922fbb705637ae9fa5203db132fc45f9f6",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-27b54d0c"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2828e8c605853f71267825c9415437c0a93e4f2",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-32c022ef"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@edeec63b13c252193d626c2a48d7a2f0e7016dc2",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-36ee46e3"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@798c2cf57c63ab39c8aac24d6a3d50f4fa5eeb06",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-3734ed1f"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@edeec63b13c252193d626c2a48d7a2f0e7016dc2",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-63600172"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e088ceb73c24ab4774da391d54a6426f4bfaefce",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-7125113c"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@48d7ee321ea5182c6a70782aa186422a70e67e22",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-82acff06"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@48d7ee321ea5182c6a70782aa186422a70e67e22",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-84b37631"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@798c2cf57c63ab39c8aac24d6a3d50f4fa5eeb06",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-a3bdc4a1"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cba7ca667ceb06934746ddd9833a25847bde81d",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-afd16960"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1740e5922fbb705637ae9fa5203db132fc45f9f6",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-b0f734ed"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53ecd09ef2fb35fa69667ae8e414ef6b00fd3bf6",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-b16cd43e"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "icmp_global_allow",
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@53ecd09ef2fb35fa69667ae8e414ef6b00fd3bf6",
"digest": {
"function_hash": "247080136503129066264894808394118866385",
"length": 719.0
},
"signature_type": "Function",
"id": "CVE-2022-49638-d0d49bfe"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e088ceb73c24ab4774da391d54a6426f4bfaefce",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-da45e9ed"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e2828e8c605853f71267825c9415437c0a93e4f2",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-db53d01f"
},
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "net/ipv4/icmp.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cba7ca667ceb06934746ddd9833a25847bde81d",
"digest": {
"line_hashes": [
"66142126169558649170377922535465877448",
"32236497247631015778334327294355169836",
"184344321306551080130709644153168555454",
"164713504659451002413426818737273749573",
"96538117110993605507255511770731618334",
"54855329205644581768888666962228955377",
"81312689358355202258492770373815174857",
"123750621088794614605352165668806742528"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2022-49638-dea790da"
}
]