CVE-2022-48714

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48714
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48714.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48714
Downstream
Related
Published
2024-06-20T11:13:08Z
Modified
2025-10-08T06:49:55.121879Z
Summary
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Use VMMAP instead of VMALLOC for ringbuf

After commit 2fd3fb0be1d1 ("kasan, vmalloc: unpoison VMALLOC pages after mapping"), non-VMALLOC mappings will be marked as accessible in _getvmareanode() when KASAN is enabled. But now the flag for ringbuf area is VMALLOC, so KASAN will complain out-of-bound access after vmap() returns. Because the ringbuf area is created by mapping allocated pages, so use VMMAP instead.

After the change, info in /proc/vmallocinfo also changes from [start]-[end] 24576 ringbufmapalloc+0x171/0x290 vmalloc user to [start]-[end] 24576 ringbufmapalloc+0x171/0x290 vmap user

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
457f44363a8894135c85b7a9afd2bd8196db24ab
Fixed
6304a613a97d6dcd49b93fbad31e9f39d1e138d6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
457f44363a8894135c85b7a9afd2bd8196db24ab
Fixed
5e457aeab52a5947619e1f18047f4d2f3212b3eb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
457f44363a8894135c85b7a9afd2bd8196db24ab
Fixed
d578933f6226d5419af9306746efa1c693cbaf9c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
457f44363a8894135c85b7a9afd2bd8196db24ab
Fixed
b293dcc473d22a62dc6d78de2b15e4f49515db56

Affected versions

v5.*

v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.10.1
v5.10.10
v5.10.11
v5.10.12
v5.10.13
v5.10.14
v5.10.15
v5.10.16
v5.10.17
v5.10.18
v5.10.19
v5.10.2
v5.10.20
v5.10.21
v5.10.22
v5.10.23
v5.10.24
v5.10.25
v5.10.26
v5.10.27
v5.10.28
v5.10.29
v5.10.3
v5.10.30
v5.10.31
v5.10.32
v5.10.33
v5.10.34
v5.10.35
v5.10.36
v5.10.37
v5.10.38
v5.10.39
v5.10.4
v5.10.40
v5.10.41
v5.10.42
v5.10.43
v5.10.44
v5.10.45
v5.10.46
v5.10.47
v5.10.48
v5.10.49
v5.10.5
v5.10.50
v5.10.51
v5.10.52
v5.10.53
v5.10.54
v5.10.55
v5.10.56
v5.10.57
v5.10.58
v5.10.59
v5.10.6
v5.10.60
v5.10.61
v5.10.62
v5.10.63
v5.10.64
v5.10.65
v5.10.66
v5.10.67
v5.10.68
v5.10.69
v5.10.7
v5.10.70
v5.10.71
v5.10.72
v5.10.73
v5.10.74
v5.10.75
v5.10.76
v5.10.77
v5.10.78
v5.10.79
v5.10.8
v5.10.80
v5.10.81
v5.10.82
v5.10.83
v5.10.84
v5.10.85
v5.10.86
v5.10.87
v5.10.88
v5.10.89
v5.10.9
v5.10.90
v5.10.91
v5.10.92
v5.10.93
v5.10.94
v5.10.95
v5.10.96
v5.10.97
v5.10.98
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.3
v5.15.4
v5.15.5
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "digest": {
                "length": 890.0,
                "function_hash": "103143424286519794538887788977220674000"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d578933f6226d5419af9306746efa1c693cbaf9c",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c",
                "function": "bpf_ringbuf_area_alloc"
            },
            "signature_type": "Function",
            "id": "CVE-2022-48714-12b9bc4a"
        },
        {
            "signature_version": "v1",
            "digest": {
                "length": 890.0,
                "function_hash": "103143424286519794538887788977220674000"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e457aeab52a5947619e1f18047f4d2f3212b3eb",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c",
                "function": "bpf_ringbuf_area_alloc"
            },
            "signature_type": "Function",
            "id": "CVE-2022-48714-27d398af"
        },
        {
            "signature_version": "v1",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "1331549256368949368334005534948221492",
                    "103271353061302797017848937926442551313",
                    "317343065441120226642425552145358923114",
                    "208471469823214520633072830467538548383"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e457aeab52a5947619e1f18047f4d2f3212b3eb",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c"
            },
            "signature_type": "Line",
            "id": "CVE-2022-48714-3e626952"
        },
        {
            "signature_version": "v1",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "1331549256368949368334005534948221492",
                    "103271353061302797017848937926442551313",
                    "317343065441120226642425552145358923114",
                    "208471469823214520633072830467538548383"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d578933f6226d5419af9306746efa1c693cbaf9c",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c"
            },
            "signature_type": "Line",
            "id": "CVE-2022-48714-4900d6e5"
        },
        {
            "signature_version": "v1",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "1331549256368949368334005534948221492",
                    "103271353061302797017848937926442551313",
                    "317343065441120226642425552145358923114",
                    "208471469823214520633072830467538548383"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b293dcc473d22a62dc6d78de2b15e4f49515db56",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c"
            },
            "signature_type": "Line",
            "id": "CVE-2022-48714-b0558076"
        },
        {
            "signature_version": "v1",
            "digest": {
                "length": 949.0,
                "function_hash": "44345574485246003168035363489503716610"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6304a613a97d6dcd49b93fbad31e9f39d1e138d6",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c",
                "function": "bpf_ringbuf_area_alloc"
            },
            "signature_type": "Function",
            "id": "CVE-2022-48714-cc224c58"
        },
        {
            "signature_version": "v1",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "1331549256368949368334005534948221492",
                    "103271353061302797017848937926442551313",
                    "317343065441120226642425552145358923114",
                    "208471469823214520633072830467538548383"
                ]
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6304a613a97d6dcd49b93fbad31e9f39d1e138d6",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c"
            },
            "signature_type": "Line",
            "id": "CVE-2022-48714-d4f40fb1"
        },
        {
            "signature_version": "v1",
            "digest": {
                "length": 890.0,
                "function_hash": "103143424286519794538887788977220674000"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b293dcc473d22a62dc6d78de2b15e4f49515db56",
            "deprecated": false,
            "target": {
                "file": "kernel/bpf/ringbuf.c",
                "function": "bpf_ringbuf_area_alloc"
            },
            "signature_type": "Function",
            "id": "CVE-2022-48714-f9402af1"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.99
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.22
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.8