CVE-2022-49852
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
23/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
riscv: process: fix kernel info leakage<br />
<br />
thread_struct&#39;s s[12] may contain random kernel memory content, which<br />
may be finally leaked to userspace. This is a security hole. Fix it<br />
by clearing the s[12] array in thread_struct when fork.<br />
<br />
As for kthread case, it&#39;s better to clear the s[12] array as well.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.267 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.225 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.155 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.79 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/358a68f98304b40b201ba5afe94c20355aa3dc68
- https://git.kernel.org/stable/c/6510c78490c490a6636e48b61eeaa6fb65981f4b
- https://git.kernel.org/stable/c/c4601d30f7d989b4f354df899ab85b5f7a750d30
- https://git.kernel.org/stable/c/c5c0b3167537793a7cf936fb240366eefd2fc7fb
- https://git.kernel.org/stable/c/cc36c7fa5d9384602529ba3eea8c5daee7be4dbc
- https://git.kernel.org/stable/c/e56d18a976dda653194218df6d40d8122c775712



