In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix a data-race around bpfjitlimit.
While reading bpfjitlimit, it can be changed concurrently via sysctl, WRITEONCE() in _doprocdoulongvecminmax(). The size of bpfjitlimit is long, so we need to add a paired READONCE() to avoid load-tearing.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49967.json",
"cna_assigner": "Linux"
}[
{
"target": {
"function": "bpf_jit_charge_modmem",
"file": "kernel/bpf/core.c"
},
"id": "CVE-2022-49967-3bb86268",
"deprecated": false,
"digest": {
"length": 195.0,
"function_hash": "191300656526963241008770313180351156298"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba632ad0bacb13197a8f38e7526448974e87f292",
"signature_version": "v1"
},
{
"target": {
"file": "kernel/bpf/core.c"
},
"id": "CVE-2022-49967-6ca4774c",
"deprecated": false,
"digest": {
"line_hashes": [
"50752635572949459524308915154514989980",
"132992398985354132358716160290600456592",
"123489158654937569572281058186154945274",
"28849357389781104848278241045542872350"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba632ad0bacb13197a8f38e7526448974e87f292",
"signature_version": "v1"
},
{
"target": {
"function": "bpf_jit_charge_modmem",
"file": "kernel/bpf/core.c"
},
"id": "CVE-2022-49967-839e5849",
"deprecated": false,
"digest": {
"length": 195.0,
"function_hash": "191300656526963241008770313180351156298"
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0947ae1121083d363d522ff7518ee72b55bd8d29",
"signature_version": "v1"
},
{
"target": {
"file": "kernel/bpf/core.c"
},
"id": "CVE-2022-49967-85509dbf",
"deprecated": false,
"digest": {
"line_hashes": [
"50752635572949459524308915154514989980",
"132992398985354132358716160290600456592",
"123489158654937569572281058186154945274",
"28849357389781104848278241045542872350"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0947ae1121083d363d522ff7518ee72b55bd8d29",
"signature_version": "v1"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49967.json"