CVE-2022-49562

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits Use the recently introduced __try_cmpxchg_user() to update guest PTE A/D bits instead of mapping the PTE into kernel address space. The VM_PFNMAP path is broken as it assumes that vm_pgoff is the base pfn of the mapped VMA range, which is conceptually wrong as vm_pgoff is the offset relative to the file and has nothing to do with the pfn. The horrific hack worked for the original use case (backing guest memory with /dev/mem), but leads to accessing "random" pfns for pretty much any other VM_PFNMAP case.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 19:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Use __try_cmpxchg_user() para actualizar los bits A/D de la PTE invitada Use la recientemente introducida __try_cmpxchg_user() para actualizar los bits A/D de la PTE invitada en lugar de mapear la PTE en el espacio de direcciones del kernel. La ruta VM_PFNMAP está rota ya que asume que vm_pgoff es la pfn base del rango VMA mapeado, lo cual es conceptualmente incorrecto ya que vm_pgoff es el desplazamiento relativo al archivo y no tiene nada que ver con la pfn. El horrible hack funcionó para el caso de uso original (respaldar la memoria invitada con /dev/mem), pero conduce al acceso a pfn "aleatorios" para prácticamente cualquier otro caso VM_PFNMAP.
References () https://git.kernel.org/stable/c/38b888911e8dc89b89d8147cfb1d2dbe6373bf78 - () https://git.kernel.org/stable/c/38b888911e8dc89b89d8147cfb1d2dbe6373bf78 - Patch
References () https://git.kernel.org/stable/c/8089e5e1d18402fb8152d6b6815450a36fffa9b0 - () https://git.kernel.org/stable/c/8089e5e1d18402fb8152d6b6815450a36fffa9b0 - Patch
References () https://git.kernel.org/stable/c/f122dfe4476890d60b8c679128cd2259ec96a24c - () https://git.kernel.org/stable/c/f122dfe4476890d60b8c679128cd2259ec96a24c - Patch
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-22 19:10


NVD link : CVE-2022-49562

Mitre link : CVE-2022-49562

CVE.ORG link : CVE-2022-49562


JSON object : View

Products Affected

linux

  • linux_kernel