CVE-2022-49840

Source
https://cve.org/CVERecord?id=CVE-2022-49840
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49840.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49840
Downstream
Related
Published
2025-05-01T14:09:56.233Z
Modified
2026-04-02T08:27:58.379155Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
bpf, test_run: Fix alignment problem in bpf_prog_test_run_skb()
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf, testrun: Fix alignment problem in bpfprogtestrun_skb()

We got a syzkaller problem because of aarch64 alignment fault if KFENCE enabled. When the size from user bpf program is an odd number, like 399, 407, etc, it will cause the struct skbsharedinfo's unaligned access. As seen below:

BUG: KFENCE: use-after-free read in _skbclone+0x23c/0x2a0 net/core/skbuff.c:1032

Use-after-free read at 0xffff6254fffac077 (in kfence-#213): __lseatomicadd arch/arm64/include/asm/atomiclse.h:26 [inline] archatomicadd arch/arm64/include/asm/atomic.h:28 [inline] archatomicinc include/linux/atomic-arch-fallback.h:270 [inline] atomicinc include/asm-generic/atomic-instrumented.h:241 [inline] __skbclone+0x23c/0x2a0 net/core/skbuff.c:1032 skbclone+0xf4/0x214 net/core/skbuff.c:1481 ____bpfcloneredirect net/core/filter.c:2433 [inline] bpfcloneredirect+0x78/0x1c0 net/core/filter.c:2420 bpfprogd3839dd9068ceb51+0x80/0x330 bpfdispatchernopfunc include/linux/bpf.h:728 [inline] bpftestrun+0x3c0/0x6c0 net/bpf/testrun.c:53 bpfprogtestrunskb+0x638/0xa7c net/bpf/testrun.c:594 bpfprogtestrun kernel/bpf/syscall.c:3148 [inline] __dosysbpf kernel/bpf/syscall.c:4441 [inline] __sesysbpf+0xad0/0x1634 kernel/bpf/syscall.c:4381

kfence-#213: 0xffff6254fffac000-0xffff6254fffac196, size=407, cache=kmalloc-512

allocated by task 15074 on cpu 0 at 1342.585390s: kmalloc include/linux/slab.h:568 [inline] kzalloc include/linux/slab.h:675 [inline] bpftestinit.isra.0+0xac/0x290 net/bpf/testrun.c:191 bpfprogtestrunskb+0x11c/0xa7c net/bpf/testrun.c:512 bpfprogtest_run kernel/bpf/syscall.c:3148 [inline] __dosysbpf kernel/bpf/syscall.c:4441 [inline] __sesysbpf+0xad0/0x1634 kernel/bpf/syscall.c:4381 __arm64sysbpf+0x50/0x60 kernel/bpf/syscall.c:4381

To fix the problem, we adjust @size so that (@size + @hearoom) is a multiple of SMPCACHEBYTES. So we make sure the struct skbsharedinfo is aligned to a cache line.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49840.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1cf1cae963c2e6032aebe1637e995bc2f5d330f4
Fixed
047824a730699c6c66df43306b80f700c9dfc2fd
Fixed
730fb1ef974a13915bc7651364d8b3318891cd70
Fixed
7a704dbfd3735304e261f2787c52fbc7c3884736
Fixed
e60f37a1d379c821c17b08f366412dce9ef3d99f
Fixed
eaa8edd86514afac9deb9bf9a5053e74f37edf40
Fixed
1b597f2d6a55e9f549989913860ad5170da04964
Fixed
d3fd203f36d46aa29600a72d57a1b61af80e4a25

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49840.json"