Bug 2373550 (CVE-2022-49972) - CVE-2022-49972 kernel: xsk: Fix corrupted packets for XDP_SHARED_UMEM
Summary: CVE-2022-49972 kernel: xsk: Fix corrupted packets for XDP_SHARED_UMEM
Keywords:
Status: NEW
Alias: CVE-2022-49972
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-06-18 12:07 UTC by OSIDB Bzimport
Modified: 2025-06-19 14:06 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-06-18 12:07:54 UTC
In the Linux kernel, the following vulnerability has been resolved:

xsk: Fix corrupted packets for XDP_SHARED_UMEM

Fix an issue in XDP_SHARED_UMEM mode together with aligned mode where
packets are corrupted for the second and any further sockets bound to
the same umem. In other words, this does not affect the first socket
bound to the umem. The culprit for this bug is that the initialization
of the DMA addresses for the pre-populated xsk buffer pool entries was
not performed for any socket but the first one bound to the umem. Only
the linear array of DMA addresses was populated. Fix this by populating
the DMA addresses in the xsk buffer pool for every socket bound to the
same umem.

Comment 1 Avinash Hanwate 2025-06-19 13:57:25 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025061818-CVE-2022-49972-651b@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.