SB2024082234 - Improper locking in Linux kernel bpf
Published: August 22, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper locking (CVE-ID: CVE-2022-48939)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the generic_map_delete_batch(), generic_map_update_batch() and generic_map_lookup_batch() functions in kernel/bpf/syscall.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b
- https://git.kernel.org/stable/c/8628f489b749a4f9767991631921dbe3fbcdc784
- https://git.kernel.org/stable/c/7e8099967d0e3ff9d1ae043e80b27fbe46c08417
- https://git.kernel.org/stable/c/75134f16e7dd0007aa474b281935c5f42e79f2c8
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.103
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.26
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17