CVE-2022-49972

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49972
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49972.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49972
Related
Published
2025-06-18T11:15:24Z
Modified
2025-06-18T16:00:25Z
Downstream
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

xsk: Fix corrupted packets for XDPSHAREDUMEM

Fix an issue in XDPSHAREDUMEM mode together with aligned mode where packets are corrupted for the second and any further sockets bound to the same umem. In other words, this does not affect the first socket bound to the umem. The culprit for this bug is that the initialization of the DMA addresses for the pre-populated xsk buffer pool entries was not performed for any socket but the first one bound to the umem. Only the linear array of DMA addresses was populated. Fix this by populating the DMA addresses in the xsk buffer pool for every socket bound to the same umem.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}