CVE-2022-49828
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
10/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
hugetlbfs: don&#39;t delete error page from pagecache<br />
<br />
This change is very similar to the change that was made for shmem [1], and<br />
it solves the same problem but for HugeTLBFS instead.<br />
<br />
Currently, when poison is found in a HugeTLB page, the page is removed<br />
from the page cache. That means that attempting to map or read that<br />
hugepage in the future will result in a new hugepage being allocated<br />
instead of notifying the user that the page was poisoned. As [1] states,<br />
this is effectively memory corruption.<br />
<br />
The fix is to leave the page in the page cache. If the user attempts to<br />
use a poisoned HugeTLB page with a syscall, the syscall will fail with<br />
EIO, the same error code that shmem uses. For attempts to map the page,<br />
the thread will get a BUS_MCEERR_AR SIGBUS.<br />
<br />
[1]: commit a76054266661 ("mm: shmem: don&#39;t truncate page if memory failure happens")
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.80 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



