CVE-2022-48897 (GCVE-0-2022-48897)
Vulnerability from cvelistv5 – Published: 2024-08-21 06:10 – Updated: 2025-05-04 08:25
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved:
arm64/mm: fix incorrect file_map_count for invalid pmd
The page table check trigger BUG_ON() unexpectedly when split hugepage:
------------[ cut here ]------------
kernel BUG at mm/page_table_check.c:119!
Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
Dumping ftrace buffer:
(ftrace buffer empty)
Modules linked in:
CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748
Hardware name: linux,dummy-virt (DT)
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : page_table_check_set.isra.0+0x398/0x468
lr : page_table_check_set.isra.0+0x1c0/0x468
[...]
Call trace:
page_table_check_set.isra.0+0x398/0x468
__page_table_check_pte_set+0x160/0x1c0
__split_huge_pmd_locked+0x900/0x1648
__split_huge_pmd+0x28c/0x3b8
unmap_page_range+0x428/0x858
unmap_single_vma+0xf4/0x1c8
zap_page_range+0x2b0/0x410
madvise_vma_behavior+0xc44/0xe78
do_madvise+0x280/0x698
__arm64_sys_madvise+0x90/0xe8
invoke_syscall.constprop.0+0xdc/0x1d8
do_el0_svc+0xf4/0x3f8
el0_svc+0x58/0x120
el0t_64_sync_handler+0xb8/0xc0
el0t_64_sync+0x19c/0x1a0
[...]
On arm64, pmd_leaf() will return true even if the pmd is invalid due to
pmd_present_invalid() check. So in pmdp_invalidate() the file_map_count
will not only decrease once but also increase once. Then in set_pte_at(),
the file_map_count increase again, and so trigger BUG_ON() unexpectedly.
Add !pmd_present_invalid() check in pmd_user_accessible_page() to fix the
problem.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-48897",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-10T16:04:02.667738Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-12T17:33:12.803Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/arm64/include/asm/pgtable.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "21e5eca0ac9046da9918a919bc92b7b5a78d27e7",
"status": "affected",
"version": "42b2547137f5c974bb1bfd657c869fe96b96d86f",
"versionType": "git"
},
{
"lessThan": "74c2f81054510d45b813548cb0a1c4ebf87cdd5f",
"status": "affected",
"version": "42b2547137f5c974bb1bfd657c869fe96b96d86f",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/arm64/include/asm/pgtable.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.19"
},
{
"lessThan": "5.19",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.7",
"versionStartIncluding": "5.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "5.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/mm: fix incorrect file_map_count for invalid pmd\n\nThe page table check trigger BUG_ON() unexpectedly when split hugepage:\n\n ------------[ cut here ]------------\n kernel BUG at mm/page_table_check.c:119!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n Dumping ftrace buffer:\n (ftrace buffer empty)\n Modules linked in:\n CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748\n Hardware name: linux,dummy-virt (DT)\n pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : page_table_check_set.isra.0+0x398/0x468\n lr : page_table_check_set.isra.0+0x1c0/0x468\n[...]\n Call trace:\n page_table_check_set.isra.0+0x398/0x468\n __page_table_check_pte_set+0x160/0x1c0\n __split_huge_pmd_locked+0x900/0x1648\n __split_huge_pmd+0x28c/0x3b8\n unmap_page_range+0x428/0x858\n unmap_single_vma+0xf4/0x1c8\n zap_page_range+0x2b0/0x410\n madvise_vma_behavior+0xc44/0xe78\n do_madvise+0x280/0x698\n __arm64_sys_madvise+0x90/0xe8\n invoke_syscall.constprop.0+0xdc/0x1d8\n do_el0_svc+0xf4/0x3f8\n el0_svc+0x58/0x120\n el0t_64_sync_handler+0xb8/0xc0\n el0t_64_sync+0x19c/0x1a0\n[...]\n\nOn arm64, pmd_leaf() will return true even if the pmd is invalid due to\npmd_present_invalid() check. So in pmdp_invalidate() the file_map_count\nwill not only decrease once but also increase once. Then in set_pte_at(),\nthe file_map_count increase again, and so trigger BUG_ON() unexpectedly.\n\nAdd !pmd_present_invalid() check in pmd_user_accessible_page() to fix the\nproblem."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T08:25:42.538Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/21e5eca0ac9046da9918a919bc92b7b5a78d27e7"
},
{
"url": "https://git.kernel.org/stable/c/74c2f81054510d45b813548cb0a1c4ebf87cdd5f"
}
],
"title": "arm64/mm: fix incorrect file_map_count for invalid pmd",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-48897",
"datePublished": "2024-08-21T06:10:29.785Z",
"dateReserved": "2024-08-21T06:06:23.291Z",
"dateUpdated": "2025-05-04T08:25:42.538Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.19\", \"versionEndExcluding\": \"6.1.7\", \"matchCriteriaId\": \"A3B4D9E4-9005-47B1-B0C1-FFC9874D6FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF501633-2F44-4913-A8EE-B021929F49F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BDA597B-CAC1-4DF0-86F0-42E142C654E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"725C78C9-12CE-406F-ABE8-0813A01D66E8\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\narm64/mm: fix incorrect file_map_count for invalid pmd\\n\\nThe page table check trigger BUG_ON() unexpectedly when split hugepage:\\n\\n ------------[ cut here ]------------\\n kernel BUG at mm/page_table_check.c:119!\\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\\n Dumping ftrace buffer:\\n (ftrace buffer empty)\\n Modules linked in:\\n CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748\\n Hardware name: linux,dummy-virt (DT)\\n pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n pc : page_table_check_set.isra.0+0x398/0x468\\n lr : page_table_check_set.isra.0+0x1c0/0x468\\n[...]\\n Call trace:\\n page_table_check_set.isra.0+0x398/0x468\\n __page_table_check_pte_set+0x160/0x1c0\\n __split_huge_pmd_locked+0x900/0x1648\\n __split_huge_pmd+0x28c/0x3b8\\n unmap_page_range+0x428/0x858\\n unmap_single_vma+0xf4/0x1c8\\n zap_page_range+0x2b0/0x410\\n madvise_vma_behavior+0xc44/0xe78\\n do_madvise+0x280/0x698\\n __arm64_sys_madvise+0x90/0xe8\\n invoke_syscall.constprop.0+0xdc/0x1d8\\n do_el0_svc+0xf4/0x3f8\\n el0_svc+0x58/0x120\\n el0t_64_sync_handler+0xb8/0xc0\\n el0t_64_sync+0x19c/0x1a0\\n[...]\\n\\nOn arm64, pmd_leaf() will return true even if the pmd is invalid due to\\npmd_present_invalid() check. So in pmdp_invalidate() the file_map_count\\nwill not only decrease once but also increase once. Then in set_pte_at(),\\nthe file_map_count increase again, and so trigger BUG_ON() unexpectedly.\\n\\nAdd !pmd_present_invalid() check in pmd_user_accessible_page() to fix the\\nproblem.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: arm64/mm: corrige file_map_count incorrecto para pmd no v\\u00e1lido. La verificaci\\u00f3n de la tabla de p\\u00e1ginas activa BUG_ON() inesperadamente cuando se divide una p\\u00e1gina enorme: ------------[ cortar aqu\\u00ed ]------------ \\u00a1ERROR del kernel en mm/page_table_check.c:119! Error interno: Ups - ERROR: 00000000f2000800 [#1] SMP Dumping ftrace buffer: (ftrace buffer vac\\u00edo) M\\u00f3dulos vinculados en: CPU: 7 PID: 210 Comm: transhuge-stres No contaminado 6.1.0-rc3+ #748 Nombre de hardware: linux ,dummy-virt (DT) pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: page_table_check_set.isra.0+0x398/0x468 lr: page_table_check_set.isra.0+0x1c0/0x468 [...] Rastreo de llamadas: page_table_check_set.isra.0+0x398/0x468 __page_table_check_pte_set+0x160/0x1c0 __split_huge_pmd_locked+0x900/0x1648 __split_huge_pmd+0x28c/0x3b8 unmap_page_range+0x428/0x858 single_vma+0xf4/0x1c8 zap_page_range+0x2b0/0x410 madvise_vma_behavior+0xc44 /0xe78 do_madvise+0x280/0x698 __arm64_sys_madvise+0x90/0xe8 invoke_syscall.constprop.0+0xdc/0x1d8 do_el0_svc+0xf4/0x3f8 el0_svc+0x58/0x120 el0t_64_sync_handler+0x b8/0xc0 el0t_64_sync+0x19c/0x1a0 [...] En arm64, pmd_leaf () devolver\\u00e1 verdadero incluso si el pmd no es v\\u00e1lido debido a la verificaci\\u00f3n pmd_present_invalid(). Entonces, en pmdp_invalidate() file_map_count no solo disminuir\\u00e1 una vez sino que tambi\\u00e9n aumentar\\u00e1 una vez. Luego, en set_pte_at(), file_map_count aumenta nuevamente y, por lo tanto, activa BUG_ON() inesperadamente. Agregue !pmd_present_invalid() check in pmd_user_accessible_page() para solucionar el problema.\"}]",
"id": "CVE-2022-48897",
"lastModified": "2024-09-11T16:10:40.843",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-08-21T07:15:05.693",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/21e5eca0ac9046da9918a919bc92b7b5a78d27e7\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/74c2f81054510d45b813548cb0a1c4ebf87cdd5f\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-48897\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-21T07:15:05.693\",\"lastModified\":\"2024-09-11T16:10:40.843\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\narm64/mm: fix incorrect file_map_count for invalid pmd\\n\\nThe page table check trigger BUG_ON() unexpectedly when split hugepage:\\n\\n ------------[ cut here ]------------\\n kernel BUG at mm/page_table_check.c:119!\\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\\n Dumping ftrace buffer:\\n (ftrace buffer empty)\\n Modules linked in:\\n CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748\\n Hardware name: linux,dummy-virt (DT)\\n pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n pc : page_table_check_set.isra.0+0x398/0x468\\n lr : page_table_check_set.isra.0+0x1c0/0x468\\n[...]\\n Call trace:\\n page_table_check_set.isra.0+0x398/0x468\\n __page_table_check_pte_set+0x160/0x1c0\\n __split_huge_pmd_locked+0x900/0x1648\\n __split_huge_pmd+0x28c/0x3b8\\n unmap_page_range+0x428/0x858\\n unmap_single_vma+0xf4/0x1c8\\n zap_page_range+0x2b0/0x410\\n madvise_vma_behavior+0xc44/0xe78\\n do_madvise+0x280/0x698\\n __arm64_sys_madvise+0x90/0xe8\\n invoke_syscall.constprop.0+0xdc/0x1d8\\n do_el0_svc+0xf4/0x3f8\\n el0_svc+0x58/0x120\\n el0t_64_sync_handler+0xb8/0xc0\\n el0t_64_sync+0x19c/0x1a0\\n[...]\\n\\nOn arm64, pmd_leaf() will return true even if the pmd is invalid due to\\npmd_present_invalid() check. So in pmdp_invalidate() the file_map_count\\nwill not only decrease once but also increase once. Then in set_pte_at(),\\nthe file_map_count increase again, and so trigger BUG_ON() unexpectedly.\\n\\nAdd !pmd_present_invalid() check in pmd_user_accessible_page() to fix the\\nproblem.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: arm64/mm: corrige file_map_count incorrecto para pmd no v\u00e1lido. La verificaci\u00f3n de la tabla de p\u00e1ginas activa BUG_ON() inesperadamente cuando se divide una p\u00e1gina enorme: ------------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel en mm/page_table_check.c:119! Error interno: Ups - ERROR: 00000000f2000800 [#1] SMP Dumping ftrace buffer: (ftrace buffer vac\u00edo) M\u00f3dulos vinculados en: CPU: 7 PID: 210 Comm: transhuge-stres No contaminado 6.1.0-rc3+ #748 Nombre de hardware: linux ,dummy-virt (DT) pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: page_table_check_set.isra.0+0x398/0x468 lr: page_table_check_set.isra.0+0x1c0/0x468 [...] Rastreo de llamadas: page_table_check_set.isra.0+0x398/0x468 __page_table_check_pte_set+0x160/0x1c0 __split_huge_pmd_locked+0x900/0x1648 __split_huge_pmd+0x28c/0x3b8 unmap_page_range+0x428/0x858 single_vma+0xf4/0x1c8 zap_page_range+0x2b0/0x410 madvise_vma_behavior+0xc44 /0xe78 do_madvise+0x280/0x698 __arm64_sys_madvise+0x90/0xe8 invoke_syscall.constprop.0+0xdc/0x1d8 do_el0_svc+0xf4/0x3f8 el0_svc+0x58/0x120 el0t_64_sync_handler+0x b8/0xc0 el0t_64_sync+0x19c/0x1a0 [...] En arm64, pmd_leaf () devolver\u00e1 verdadero incluso si el pmd no es v\u00e1lido debido a la verificaci\u00f3n pmd_present_invalid(). Entonces, en pmdp_invalidate() file_map_count no solo disminuir\u00e1 una vez sino que tambi\u00e9n aumentar\u00e1 una vez. Luego, en set_pte_at(), file_map_count aumenta nuevamente y, por lo tanto, activa BUG_ON() inesperadamente. Agregue !pmd_present_invalid() check in pmd_user_accessible_page() para solucionar el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.19\",\"versionEndExcluding\":\"6.1.7\",\"matchCriteriaId\":\"A3B4D9E4-9005-47B1-B0C1-FFC9874D6FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF501633-2F44-4913-A8EE-B021929F49F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BDA597B-CAC1-4DF0-86F0-42E142C654E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"725C78C9-12CE-406F-ABE8-0813A01D66E8\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/21e5eca0ac9046da9918a919bc92b7b5a78d27e7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/74c2f81054510d45b813548cb0a1c4ebf87cdd5f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48897\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:04:02.667738Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:17.532Z\"}}], \"cna\": {\"title\": \"arm64/mm: fix incorrect file_map_count for invalid pmd\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"42b2547137f5c974bb1bfd657c869fe96b96d86f\", \"lessThan\": \"21e5eca0ac9046da9918a919bc92b7b5a78d27e7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"42b2547137f5c974bb1bfd657c869fe96b96d86f\", \"lessThan\": \"74c2f81054510d45b813548cb0a1c4ebf87cdd5f\", \"versionType\": \"git\"}], \"programFiles\": [\"arch/arm64/include/asm/pgtable.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.19\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.19\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.1.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.2\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"arch/arm64/include/asm/pgtable.h\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/21e5eca0ac9046da9918a919bc92b7b5a78d27e7\"}, {\"url\": \"https://git.kernel.org/stable/c/74c2f81054510d45b813548cb0a1c4ebf87cdd5f\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\narm64/mm: fix incorrect file_map_count for invalid pmd\\n\\nThe page table check trigger BUG_ON() unexpectedly when split hugepage:\\n\\n ------------[ cut here ]------------\\n kernel BUG at mm/page_table_check.c:119!\\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\\n Dumping ftrace buffer:\\n (ftrace buffer empty)\\n Modules linked in:\\n CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748\\n Hardware name: linux,dummy-virt (DT)\\n pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n pc : page_table_check_set.isra.0+0x398/0x468\\n lr : page_table_check_set.isra.0+0x1c0/0x468\\n[...]\\n Call trace:\\n page_table_check_set.isra.0+0x398/0x468\\n __page_table_check_pte_set+0x160/0x1c0\\n __split_huge_pmd_locked+0x900/0x1648\\n __split_huge_pmd+0x28c/0x3b8\\n unmap_page_range+0x428/0x858\\n unmap_single_vma+0xf4/0x1c8\\n zap_page_range+0x2b0/0x410\\n madvise_vma_behavior+0xc44/0xe78\\n do_madvise+0x280/0x698\\n __arm64_sys_madvise+0x90/0xe8\\n invoke_syscall.constprop.0+0xdc/0x1d8\\n do_el0_svc+0xf4/0x3f8\\n el0_svc+0x58/0x120\\n el0t_64_sync_handler+0xb8/0xc0\\n el0t_64_sync+0x19c/0x1a0\\n[...]\\n\\nOn arm64, pmd_leaf() will return true even if the pmd is invalid due to\\npmd_present_invalid() check. So in pmdp_invalidate() the file_map_count\\nwill not only decrease once but also increase once. Then in set_pte_at(),\\nthe file_map_count increase again, and so trigger BUG_ON() unexpectedly.\\n\\nAdd !pmd_present_invalid() check in pmd_user_accessible_page() to fix the\\nproblem.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.7\", \"versionStartIncluding\": \"5.19\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2\", \"versionStartIncluding\": \"5.19\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T08:25:42.538Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-48897\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T08:25:42.538Z\", \"dateReserved\": \"2024-08-21T06:06:23.291Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-08-21T06:10:29.785Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…