CVE-2022-49552

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix combination of jit blinding and pointers to bpf subprogs. The combination of jit blinding and pointers to bpf subprogs causes: [ 36.989548] BUG: unable to handle page fault for address: 0000000100000001 [ 36.990342] #PF: supervisor instruction fetch in kernel mode [ 36.990968] #PF: error_code(0x0010) - not-present page [ 36.994859] RIP: 0010:0x100000001 [ 36.995209] Code: Unable to access opcode bytes at RIP 0xffffffd7. [ 37.004091] Call Trace: [ 37.004351] <TASK> [ 37.004576] ? bpf_loop+0x4d/0x70 [ 37.004932] ? bpf_prog_3899083f75e4c5de_F+0xe3/0x13b The jit blinding logic didn't recognize that ld_imm64 with an address of bpf subprogram is a special instruction and proceeded to randomize it. By itself it wouldn't have been an issue, but jit_subprogs() logic relies on two step process to JIT all subprogs and then JIT them again when addresses of all subprogs are known. Blinding process in the first JIT phase caused second JIT to miss adjustment of special ld_imm64. Fix this issue by ignoring special ld_imm64 instructions that don't have user controlled constants and shouldn't be blinded.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 17:14

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/4b6313cf99b0d51b49aeaea98ec76ca8161ecb80 - () https://git.kernel.org/stable/c/4b6313cf99b0d51b49aeaea98ec76ca8161ecb80 - Patch
References () https://git.kernel.org/stable/c/a029b02b47dd5bb87a21550d9d9a80cb4dd3f714 - () https://git.kernel.org/stable/c/a029b02b47dd5bb87a21550d9d9a80cb4dd3f714 - Patch
References () https://git.kernel.org/stable/c/d106a3e96fca30e44081eae9c27aab28fc132a46 - () https://git.kernel.org/stable/c/d106a3e96fca30e44081eae9c27aab28fc132a46 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Se corrige la combinación de cegamiento jit y punteros a subprogramas bpf. La combinación de cegamiento jit y punteros a subprogramas bpf provoca: [ 36.989548] BUG: unable to handle page fault for address: 0000000100000001 [ 36.990342] #PF: supervisor instruction fetch in kernel mode [ 36.990968] #PF: error_code(0x0010) - not-present page [ 36.994859] RIP: 0010:0x100000001 [ 36.995209] Code: Unable to access opcode bytes at RIP 0xffffffd7. [ 37.004091] Call Trace: [ 37.004351] [ 37.004576] ? bpf_loop+0x4d/0x70 [ 37.004932] ? bpf_prog_3899083f75e4c5de_F+0xe3/0x13b La lógica de cegamiento de jit no reconoció que ld_imm64 con una dirección de subprograma bpf es una instrucción especial y procedió a aleatorizarla. Por sí sola no habría sido un problema, pero la lógica jit_subprogs() se basa en un proceso de dos pasos para realizar el JIT de todos los subprogramas y luego realizar el JIT nuevamente cuando se conocen las direcciones de todos los subprogramas. El proceso de cegamiento en la primera fase de JIT provocó que el segundo JIT no ajustara el ld_imm64 especial. Solucione este problema ignorando las instrucciones especiales ld_imm64 que no tienen constantes controladas por el usuario y que no deberían estar ocultas.

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-22 17:14


NVD link : CVE-2022-49552

Mitre link : CVE-2022-49552

CVE.ORG link : CVE-2022-49552


JSON object : View

Products Affected

linux

  • linux_kernel