CVE-2022-48700 Affecting kernel-cross-headers package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELCROSSHEADERS-6823057
- published 9 May 2024
- disclosed 3 May 2024
Introduced: 3 May 2024
CVE-2022-48700 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
kernel-cross-headers
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-cross-headers
package and not the kernel-cross-headers
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
vfio/type1: Unpin zero pages
There's currently a reference count leak on the zero page. We increment the reference via pin_user_pages_remote(), but the page is later handled as an invalid/reserved page, therefore it's not accounted against the user and not unpinned by our put_pfn().
Introducing special zero page handling in put_pfn() would resolve the leak, but without accounting of the zero page, a single user could still create enough mappings to generate a reference count overflow.
The zero page is always resident, so for our purposes there's no reason to keep it pinned. Therefore, add a loop to walk pages returned from pin_user_pages_remote() and unpin any zero pages.
References
- https://access.redhat.com/security/cve/CVE-2022-48700
- https://git.kernel.org/stable/c/5321908ef74fb593e0dbc8737d25038fc86c9986
- https://git.kernel.org/stable/c/578d644edc7d2c1ff53f7e4d0a25da473deb4a03
- https://git.kernel.org/stable/c/5d721bf222936f5cf3ee15ced53cc483ecef7e46
- https://git.kernel.org/stable/c/873aefb376bbc0ed1dd2381ea1d6ec88106fdbd4