We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49967

bpf: Fix a data-race around bpf_jit_limit.



Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a data-race around bpf_jit_limit. While reading bpf_jit_limit, it can be changed concurrently via sysctl, WRITE_ONCE() in __do_proc_doulongvec_minmax(). The size of bpf_jit_limit is long, so we need to add a paired READ_ONCE() to avoid load-tearing.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

ede95a63b5e84ddeea6b0c473b36ab8bfd8c6ce3 before ba632ad0bacb13197a8f38e7526448974e87f292
affected

ede95a63b5e84ddeea6b0c473b36ab8bfd8c6ce3 before 0947ae1121083d363d522ff7518ee72b55bd8d29
affected

c98446e1bab6253ddce7144cc2a91c400a323839
affected

a1fe647042affe713a17243cd10e9b25f3d83948
affected

43caa29c99db5a41b204e8ced01b00e151335ca8
affected

Default status
affected

4.20
affected

Any version before 4.20
unaffected

5.19.8
unaffected

6.0
unaffected

References

git.kernel.org/...c/ba632ad0bacb13197a8f38e7526448974e87f292

git.kernel.org/...c/0947ae1121083d363d522ff7518ee72b55bd8d29

cve.org (CVE-2022-49967)

nvd.nist.gov (CVE-2022-49967)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49967

Support options

Helpdesk Chat, Email, Knowledgebase