CVE-2022-49723
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
24/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/i915/reset: Fix error_state_read ptr + offset use<br />
<br />
Fix our pointer offset usage in error_state_read<br />
when there is no i915_gpu_coredump but buf offset<br />
is non-zero.<br />
<br />
This fixes a kernel page fault can happen when<br />
multiple tests are running concurrently in a loop<br />
and one is producing engine resets and consuming<br />
the i915 error_state dump while the other is<br />
forcing full GT resets. (takes a while to trigger).<br />
<br />
The dmesg call trace:<br />
<br />
[ 5590.803000] BUG: unable to handle page fault for address:<br />
ffffffffa0b0e000<br />
[ 5590.803009] #PF: supervisor read access in kernel mode<br />
[ 5590.803013] #PF: error_code(0x0000) - not-present page<br />
[ 5590.803016] PGD 5814067 P4D 5814067 PUD 5815063 PMD 109de4067<br />
PTE 0<br />
[ 5590.803022] Oops: 0000 [#1] PREEMPT SMP NOPTI<br />
[ 5590.803026] CPU: 5 PID: 13656 Comm: i915_hangman Tainted: G U<br />
5.17.0-rc5-ups69-guc-err-capt-rev6+ #136<br />
[ 5590.803033] Hardware name: Intel Corporation Alder Lake Client<br />
Platform/AlderLake-M LP4x RVP, BIOS ADLPFWI1.R00.<br />
3031.A02.2201171222 01/17/2022<br />
[ 5590.803039] RIP: 0010:memcpy_erms+0x6/0x10<br />
[ 5590.803045] Code: fe ff ff cc eb 1e 0f 1f 00 48 89 f8 48 89 d1<br />
48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3<br />
66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4<br />
c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20<br />
72 7e 40 38 fe<br />
[ 5590.803054] RSP: 0018:ffffc90003a8fdf0 EFLAGS: 00010282<br />
[ 5590.803057] RAX: ffff888107ee9000 RBX: ffff888108cb1a00<br />
RCX: 0000000000000f8f<br />
[ 5590.803061] RDX: 0000000000001000 RSI: ffffffffa0b0e000<br />
RDI: ffff888107ee9071<br />
[ 5590.803065] RBP: 0000000000000000 R08: 0000000000000001<br />
R09: 0000000000000001<br />
[ 5590.803069] R10: 0000000000000001 R11: 0000000000000002<br />
R12: 0000000000000019<br />
[ 5590.803073] R13: 0000000000174fff R14: 0000000000001000<br />
R15: ffff888107ee9000<br />
[ 5590.803077] FS: 00007f62a99bee80(0000) GS:ffff88849f880000(0000)<br />
knlGS:0000000000000000<br />
[ 5590.803082] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
[ 5590.803085] CR2: ffffffffa0b0e000 CR3: 000000010a1a8004<br />
CR4: 0000000000770ee0<br />
[ 5590.803089] PKRU: 55555554<br />
[ 5590.803091] Call Trace:<br />
[ 5590.803093] <br />
[ 5590.803096] error_state_read+0xa1/0xd0 [i915]<br />
[ 5590.803175] kernfs_fop_read_iter+0xb2/0x1b0<br />
[ 5590.803180] new_sync_read+0x116/0x1a0<br />
[ 5590.803185] vfs_read+0x114/0x1b0<br />
[ 5590.803189] ksys_read+0x63/0xe0<br />
[ 5590.803193] do_syscall_64+0x38/0xc0<br />
[ 5590.803197] entry_SYSCALL_64_after_hwframe+0x44/0xae<br />
[ 5590.803201] RIP: 0033:0x7f62aaea5912<br />
[ 5590.803204] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 5a b9 0c 00 e8 05<br />
19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25<br />
18 00 00 00 85 c0 75 10 0f 05 3d 00 f0 ff<br />
ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24<br />
[ 5590.803213] RSP: 002b:00007fff5b659ae8 EFLAGS: 00000246<br />
ORIG_RAX: 0000000000000000<br />
[ 5590.803218] RAX: ffffffffffffffda RBX: 0000000000100000<br />
RCX: 00007f62aaea5912<br />
[ 5590.803221] RDX: 000000000008b000 RSI: 00007f62a8c4000f<br />
RDI: 0000000000000006<br />
[ 5590.803225] RBP: 00007f62a8bcb00f R08: 0000000000200010<br />
R09: 0000000000101000<br />
[ 5590.803229] R10: 0000000000000001 R11: 0000000000000246<br />
R12: 0000000000000006<br />
[ 5590.803233] R13: 0000000000075000 R14: 00007f62a8acb010<br />
R15: 0000000000200000<br />
[ 5590.803238] <br />
[ 5590.803240] Modules linked in: i915 ttm drm_buddy drm_dp_helper<br />
drm_kms_helper syscopyarea sysfillrect sysimgblt<br />
fb_sys_fops prime_numbers nfnetlink br_netfilter<br />
overlay mei_pxp mei_hdcp x86_pkg_temp_thermal<br />
coretemp kvm_intel snd_hda_codec_hdmi snd_hda_intel<br />
<br />
---truncated---
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.0 (including) | 5.10.124 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.49 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



