CVE-2022-49972
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
13/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xsk: Fix corrupted packets for XDP_SHARED_UMEM<br />
<br />
Fix an issue in XDP_SHARED_UMEM mode together with aligned mode where<br />
packets are corrupted for the second and any further sockets bound to<br />
the same umem. In other words, this does not affect the first socket<br />
bound to the umem. The culprit for this bug is that the initialization<br />
of the DMA addresses for the pre-populated xsk buffer pool entries was<br />
not performed for any socket but the first one bound to the umem. Only<br />
the linear array of DMA addresses was populated. Fix this by populating<br />
the DMA addresses in the xsk buffer pool for every socket bound to the<br />
same umem.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



