CVE-2022-50657Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.0%
top 89.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: mm: add missing memcpy in kasan_init Hi Atish, It seems that the panic is due to the missing memcpy during kasan_init. Could you please check whether this patch is helpful? When doing kasan_populate, the new allocated base_pud/base_p4d should contain kasan_early_shadow_{pud, p4d}'s content. Add the missing memcpy to avoid page fault when read/write kasan shadow region. Tested on: - qemu with sv57 and CONFIG_KASAN on.

Affected Packages4 packages

Linuxlinux/linux_kernel5.18.06.0.7
Debianlinux/linux_kernel< 6.0.7-1+2
CVEListV5linux/linux8fbdccd2b17335e1881a23865e98c63fcc345938ff0f6becf3a6f817838b6f80a2c9cca43dce0576+2
debiandebian/linux< linux 6.0.7-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50657: In the Linux kernel, the following vulnerability has been resolved: riscv: mm: add missing memcpy in kasan_init Hi Atish, It seems that the panic is d2025-12-09
OSV
riscv: mm: add missing memcpy in kasan_init2025-12-09
GHSA
GHSA-jcqw-583m-jhjv: In the Linux kernel, the following vulnerability has been resolved: riscv: mm: add missing memcpy in kasan_init Hi Atish, It seems that the panic i2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: riscv: mm: add missing memcpy in kasan_init2025-12-09
Debian
CVE-2022-50657: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: mm: ...2022