๐Ÿ” CVE Alert

CVE-2022-49562

UNKNOWN 0.0

KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits Use the recently introduced __try_cmpxchg_user() to update guest PTE A/D bits instead of mapping the PTE into kernel address space. The VM_PFNMAP path is broken as it assumes that vm_pgoff is the base pfn of the mapped VMA range, which is conceptually wrong as vm_pgoff is the offset relative to the file and has nothing to do with the pfn. The horrific hack worked for the original use case (backing guest memory with /dev/mem), but leads to accessing "random" pfns for pretty much any other VM_PFNMAP case.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bd53cb35a3e9adb73a834a36586e9ad80e877767 < 38b888911e8dc89b89d8147cfb1d2dbe6373bf78 bd53cb35a3e9adb73a834a36586e9ad80e877767 < 8089e5e1d18402fb8152d6b6815450a36fffa9b0 bd53cb35a3e9adb73a834a36586e9ad80e877767 < f122dfe4476890d60b8c679128cd2259ec96a24c
Linux / Linux
5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/38b888911e8dc89b89d8147cfb1d2dbe6373bf78 git.kernel.org: https://git.kernel.org/stable/c/8089e5e1d18402fb8152d6b6815450a36fffa9b0 git.kernel.org: https://git.kernel.org/stable/c/f122dfe4476890d60b8c679128cd2259ec96a24c