Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a data-race around bpf_jit_limit. While reading bpf_jit_limit, it can be changed concurrently via sysctl, WRITE_ONCE() in __do_proc_doulongvec_minmax(). The size of bpf_jit_limit is long, so we need to add a paired READ_ONCE() to avoid load-tearing.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.9.190, < 4.10 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0947ae1121083d363d522ff7518ee72b55bd8d29Patch
- https://git.kernel.org/stable/c/ba632ad0bacb13197a8f38e7526448974e87f292Patch
FAQ
What is CVE-2022-49967?
CVE-2022-49967 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a data-race around bpf_jit_limit. While reading bpf_jit_limit, it can be changed concurrently via sysctl, WRITE_ONCE() in...
How severe is CVE-2022-49967?
CVE-2022-49967 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49967?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.