CVE-2022-49972

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49972
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49972.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49972
Downstream
Related
Published
2025-06-18T11:00:35Z
Modified
2025-10-13T23:19:31.373435Z
Summary
xsk: Fix corrupted packets for XDP_SHARED_UMEM
Details

In the Linux kernel, the following vulnerability has been resolved:

xsk: Fix corrupted packets for XDPSHAREDUMEM

Fix an issue in XDPSHAREDUMEM mode together with aligned mode where packets are corrupted for the second and any further sockets bound to the same umem. In other words, this does not affect the first socket bound to the umem. The culprit for this bug is that the initialization of the DMA addresses for the pre-populated xsk buffer pool entries was not performed for any socket but the first one bound to the umem. Only the linear array of DMA addresses was populated. Fix this by populating the DMA addresses in the xsk buffer pool for every socket bound to the same umem.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
94033cd8e73b8632bab7c8b7bb54caa4f5616db7
Fixed
2c75891d56ab6fe5ba0d415bfad91d514a4027cd
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
94033cd8e73b8632bab7c8b7bb54caa4f5616db7
Fixed
58ca14ed98c87cfe0d1408cc65a9745d9e9b7a56

Affected versions

v5.*

v5.15
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8
v5.19.1
v5.19.2
v5.19.3
v5.19.4
v5.19.5
v5.19.6
v5.19.7

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "id": "CVE-2022-49972-312878e2",
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "288674803308404676969667173335969780958",
                    "194704361567701212245479213975449426348",
                    "129682413504741950534838837840722174364",
                    "4906512970764623672243606032323772638",
                    "59036647222828970462755853149018810811",
                    "322865946440901259851257337453950516702",
                    "68088825201951377095387691016272738393",
                    "124562789288838833380394045505094152431",
                    "73393160452561638640129072231641954348",
                    "102691912746579184479768441173916774876",
                    "176731971749180010367161817674594249878",
                    "59012668630270294732403818814532195866"
                ]
            },
            "target": {
                "file": "net/xdp/xsk_buff_pool.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2c75891d56ab6fe5ba0d415bfad91d514a4027cd"
        },
        {
            "signature_version": "v1",
            "id": "CVE-2022-49972-4069d9b1",
            "deprecated": false,
            "digest": {
                "length": 1024.0,
                "function_hash": "59787735978580838508735021334341804624"
            },
            "target": {
                "function": "xp_dma_map",
                "file": "net/xdp/xsk_buff_pool.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2c75891d56ab6fe5ba0d415bfad91d514a4027cd"
        },
        {
            "signature_version": "v1",
            "id": "CVE-2022-49972-5aab8deb",
            "deprecated": false,
            "digest": {
                "length": 1024.0,
                "function_hash": "59787735978580838508735021334341804624"
            },
            "target": {
                "function": "xp_dma_map",
                "file": "net/xdp/xsk_buff_pool.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@58ca14ed98c87cfe0d1408cc65a9745d9e9b7a56"
        },
        {
            "signature_version": "v1",
            "id": "CVE-2022-49972-69eca08b",
            "deprecated": false,
            "digest": {
                "length": 466.0,
                "function_hash": "298116259202643040857199069988436416511"
            },
            "target": {
                "function": "xp_init_dma_info",
                "file": "net/xdp/xsk_buff_pool.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2c75891d56ab6fe5ba0d415bfad91d514a4027cd"
        },
        {
            "signature_version": "v1",
            "id": "CVE-2022-49972-dd2c583b",
            "deprecated": false,
            "digest": {
                "length": 466.0,
                "function_hash": "298116259202643040857199069988436416511"
            },
            "target": {
                "function": "xp_init_dma_info",
                "file": "net/xdp/xsk_buff_pool.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@58ca14ed98c87cfe0d1408cc65a9745d9e9b7a56"
        },
        {
            "signature_version": "v1",
            "id": "CVE-2022-49972-ef8a7776",
            "deprecated": false,
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "288674803308404676969667173335969780958",
                    "194704361567701212245479213975449426348",
                    "129682413504741950534838837840722174364",
                    "4906512970764623672243606032323772638",
                    "59036647222828970462755853149018810811",
                    "322865946440901259851257337453950516702",
                    "68088825201951377095387691016272738393",
                    "124562789288838833380394045505094152431",
                    "73393160452561638640129072231641954348",
                    "102691912746579184479768441173916774876",
                    "176731971749180010367161817674594249878",
                    "59012668630270294732403818814532195866"
                ]
            },
            "target": {
                "file": "net/xdp/xsk_buff_pool.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@58ca14ed98c87cfe0d1408cc65a9745d9e9b7a56"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.8