CVE-2022-48939

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48939
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48939.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48939
Downstream
Related
Published
2024-08-22T03:31:34Z
Modified
2025-10-13T13:44:06.150410Z
Summary
bpf: Add schedule points in batch ops
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Add schedule points in batch ops

syzbot reported various soft lockups caused by bpf batch operations.

INFO: task kworker/1:1:27 blocked for more than 140 seconds. INFO: task hung in rcu_barrier

Nothing prevents batch ops to process huge amount of data, we need to add schedule points in them.

Note that maybewaitbpfprograms(map) calls from genericmapdeletebatch() can be factorized by moving the call after the loop.

This will be done later in -next tree once we get this fix merged, unless there is strong opinion doing this optimization sooner.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cb4d03ab499d4c040f4ab6fd4389d2b49f42b5a5
Fixed
7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cb4d03ab499d4c040f4ab6fd4389d2b49f42b5a5
Fixed
8628f489b749a4f9767991631921dbe3fbcdc784
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cb4d03ab499d4c040f4ab6fd4389d2b49f42b5a5
Fixed
7e8099967d0e3ff9d1ae043e80b27fbe46c08417
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cb4d03ab499d4c040f4ab6fd4389d2b49f42b5a5
Fixed
75134f16e7dd0007aa474b281935c5f42e79f2c8

Affected versions

v5.*

v5.10
v5.10-rc1
v5.10-rc2
v5.10-rc3
v5.10-rc4
v5.10-rc5
v5.10-rc6
v5.10-rc7
v5.10.1
v5.10.10
v5.10.100
v5.10.101
v5.10.102
v5.10.11
v5.10.12
v5.10.13
v5.10.14
v5.10.15
v5.10.16
v5.10.17
v5.10.18
v5.10.19
v5.10.2
v5.10.20
v5.10.21
v5.10.22
v5.10.23
v5.10.24
v5.10.25
v5.10.26
v5.10.27
v5.10.28
v5.10.29
v5.10.3
v5.10.30
v5.10.31
v5.10.32
v5.10.33
v5.10.34
v5.10.35
v5.10.36
v5.10.37
v5.10.38
v5.10.39
v5.10.4
v5.10.40
v5.10.41
v5.10.42
v5.10.43
v5.10.44
v5.10.45
v5.10.46
v5.10.47
v5.10.48
v5.10.49
v5.10.5
v5.10.50
v5.10.51
v5.10.52
v5.10.53
v5.10.54
v5.10.55
v5.10.56
v5.10.57
v5.10.58
v5.10.59
v5.10.6
v5.10.60
v5.10.61
v5.10.62
v5.10.63
v5.10.64
v5.10.65
v5.10.66
v5.10.67
v5.10.68
v5.10.69
v5.10.7
v5.10.70
v5.10.71
v5.10.72
v5.10.73
v5.10.74
v5.10.75
v5.10.76
v5.10.77
v5.10.78
v5.10.79
v5.10.8
v5.10.80
v5.10.81
v5.10.82
v5.10.83
v5.10.84
v5.10.85
v5.10.86
v5.10.87
v5.10.88
v5.10.89
v5.10.9
v5.10.90
v5.10.91
v5.10.92
v5.10.93
v5.10.94
v5.10.95
v5.10.96
v5.10.97
v5.10.98
v5.10.99
v5.11
v5.11-rc1
v5.11-rc2
v5.11-rc3
v5.11-rc4
v5.11-rc5
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.3
v5.15.4
v5.15.5
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.10
v5.16.11
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.5
v5.5-rc5
v5.5-rc6
v5.5-rc7
v5.6
v5.6-rc1
v5.6-rc2
v5.6-rc3
v5.6-rc4
v5.6-rc5
v5.6-rc6
v5.6-rc7
v5.7
v5.7-rc1
v5.7-rc2
v5.7-rc3
v5.7-rc4
v5.7-rc5
v5.7-rc6
v5.7-rc7
v5.8
v5.8-rc1
v5.8-rc2
v5.8-rc3
v5.8-rc4
v5.8-rc5
v5.8-rc6
v5.8-rc7
v5.9
v5.9-rc1
v5.9-rc2
v5.9-rc3
v5.9-rc4
v5.9-rc5
v5.9-rc6
v5.9-rc7
v5.9-rc8

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b",
            "deprecated": false,
            "id": "CVE-2022-48939-0a646b06",
            "signature_type": "Function",
            "digest": {
                "length": 1956.0,
                "function_hash": "205037438290658946012649623537029228315"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_lookup_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@75134f16e7dd0007aa474b281935c5f42e79f2c8",
            "deprecated": false,
            "id": "CVE-2022-48939-0adfcbdc",
            "signature_type": "Function",
            "digest": {
                "length": 1956.0,
                "function_hash": "205037438290658946012649623537029228315"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_lookup_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8099967d0e3ff9d1ae043e80b27fbe46c08417",
            "deprecated": false,
            "id": "CVE-2022-48939-19349f3e",
            "signature_type": "Function",
            "digest": {
                "length": 1956.0,
                "function_hash": "205037438290658946012649623537029228315"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_lookup_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b",
            "deprecated": false,
            "id": "CVE-2022-48939-1b849ad8",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "105180040558696310586853543467702433687",
                    "319640099726400905956026332674248861880",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "64971746807504298430610741389147333178",
                    "292151428879155998951861677497856505388",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "121040725061099075271378064191750907701",
                    "262500301883126549531960468871469338787",
                    "8877648914202970368552848262239639300",
                    "78291485283137674463897924711006411135"
                ]
            },
            "target": {
                "file": "kernel/bpf/syscall.c"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@75134f16e7dd0007aa474b281935c5f42e79f2c8",
            "deprecated": false,
            "id": "CVE-2022-48939-2af39041",
            "signature_type": "Function",
            "digest": {
                "length": 976.0,
                "function_hash": "64943191837145327115907761421204443027"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_delete_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8099967d0e3ff9d1ae043e80b27fbe46c08417",
            "deprecated": false,
            "id": "CVE-2022-48939-2c9f1407",
            "signature_type": "Function",
            "digest": {
                "length": 976.0,
                "function_hash": "64943191837145327115907761421204443027"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_delete_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8099967d0e3ff9d1ae043e80b27fbe46c08417",
            "deprecated": false,
            "id": "CVE-2022-48939-53dc0604",
            "signature_type": "Function",
            "digest": {
                "length": 1196.0,
                "function_hash": "94127007243851214652888800819534790756"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_update_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b",
            "deprecated": false,
            "id": "CVE-2022-48939-6bca42fd",
            "signature_type": "Function",
            "digest": {
                "length": 1196.0,
                "function_hash": "94127007243851214652888800819534790756"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_update_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8628f489b749a4f9767991631921dbe3fbcdc784",
            "deprecated": false,
            "id": "CVE-2022-48939-6e5f0075",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "105180040558696310586853543467702433687",
                    "319640099726400905956026332674248861880",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "64971746807504298430610741389147333178",
                    "292151428879155998951861677497856505388",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "121040725061099075271378064191750907701",
                    "262500301883126549531960468871469338787",
                    "8877648914202970368552848262239639300",
                    "78291485283137674463897924711006411135"
                ]
            },
            "target": {
                "file": "kernel/bpf/syscall.c"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b",
            "deprecated": false,
            "id": "CVE-2022-48939-6f8e0098",
            "signature_type": "Function",
            "digest": {
                "length": 976.0,
                "function_hash": "64943191837145327115907761421204443027"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_delete_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@75134f16e7dd0007aa474b281935c5f42e79f2c8",
            "deprecated": false,
            "id": "CVE-2022-48939-73e11818",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "105180040558696310586853543467702433687",
                    "319640099726400905956026332674248861880",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "64971746807504298430610741389147333178",
                    "292151428879155998951861677497856505388",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "121040725061099075271378064191750907701",
                    "262500301883126549531960468871469338787",
                    "8877648914202970368552848262239639300",
                    "78291485283137674463897924711006411135"
                ]
            },
            "target": {
                "file": "kernel/bpf/syscall.c"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8628f489b749a4f9767991631921dbe3fbcdc784",
            "deprecated": false,
            "id": "CVE-2022-48939-7a016097",
            "signature_type": "Function",
            "digest": {
                "length": 976.0,
                "function_hash": "64943191837145327115907761421204443027"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_delete_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@75134f16e7dd0007aa474b281935c5f42e79f2c8",
            "deprecated": false,
            "id": "CVE-2022-48939-c2165b77",
            "signature_type": "Function",
            "digest": {
                "length": 1196.0,
                "function_hash": "94127007243851214652888800819534790756"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_update_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8628f489b749a4f9767991631921dbe3fbcdc784",
            "deprecated": false,
            "id": "CVE-2022-48939-dacf7b60",
            "signature_type": "Function",
            "digest": {
                "length": 1196.0,
                "function_hash": "94127007243851214652888800819534790756"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_update_batch"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7e8099967d0e3ff9d1ae043e80b27fbe46c08417",
            "deprecated": false,
            "id": "CVE-2022-48939-e9ad778c",
            "signature_type": "Line",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "105180040558696310586853543467702433687",
                    "319640099726400905956026332674248861880",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "64971746807504298430610741389147333178",
                    "292151428879155998951861677497856505388",
                    "216280687850051227961435782517834402036",
                    "272776003745580064591833692402935941440",
                    "121040725061099075271378064191750907701",
                    "262500301883126549531960468871469338787",
                    "8877648914202970368552848262239639300",
                    "78291485283137674463897924711006411135"
                ]
            },
            "target": {
                "file": "kernel/bpf/syscall.c"
            }
        },
        {
            "signature_version": "v1",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8628f489b749a4f9767991631921dbe3fbcdc784",
            "deprecated": false,
            "id": "CVE-2022-48939-eab226a7",
            "signature_type": "Function",
            "digest": {
                "length": 1956.0,
                "function_hash": "205037438290658946012649623537029228315"
            },
            "target": {
                "file": "kernel/bpf/syscall.c",
                "function": "generic_map_lookup_batch"
            }
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
5.10.103
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.26
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.12