Name | CVE-2022-48700 |
Description | In the Linux kernel, the following vulnerability has been resolved: vfio/type1: Unpin zero pages There's currently a reference count leak on the zero page. We increment the reference via pin_user_pages_remote(), but the page is later handled as an invalid/reserved page, therefore it's not accounted against the user and not unpinned by our put_pfn(). Introducing special zero page handling in put_pfn() would resolve the leak, but without accounting of the zero page, a single user could still create enough mappings to generate a reference count overflow. The zero page is always resident, so for our purposes there's no reason to keep it pinned. Therefore, add a loop to walk pages returned from pin_user_pages_remote() and unpin any zero pages. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | buster | 4.19.249-2 | vulnerable |
buster (security) | 4.19.304-1 | vulnerable | |
bullseye | 5.10.209-2 | fixed | |
bullseye (security) | 5.10.216-1 | fixed | |
bookworm | 6.1.76-1 | fixed | |
bookworm (security) | 6.1.90-1 | fixed | |
trixie | 6.7.12-1 | fixed | |
sid | 6.8.9-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | bullseye | 5.10.148-1 | |||
linux | source | (unstable) | 5.19.11-1 |
https://git.kernel.org/linus/873aefb376bbc0ed1dd2381ea1d6ec88106fdbd4 (6.0-rc5)