CVE-2022-48795: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix data TLB miss in sba_unmap_sg Rolf Eike Beer reported the following bug: [1274934.746891] Bad Address (null pointer deref?): Code=15 (Data TLB miss fault) at addr 0000004140000018 [1274934.746891] CPU: 3 PID: 5549 Comm: cmake Not tainted 5.15.4-gentoo-parisc64 #4 [1274934.746891] Hardware name: 9000/785/C8000 [1274934.746891] [1274934.746891] YZrvWESTHLNXBCVMcbcbcbcbOGFRQPDI [1274934.746891] PSW: 00001000000001001111111000001110 Not tainted [1274934.746891] r00-03 000000ff0804fe0e 0000000040bc9bc0 00000000406760e4 0000004140000000 [1274934.746891] r04-07 0000000040b693c0 0000004140000000 000000004a2b08b0 0000000000000001 [1274934.746891] r08-11 0000000041f98810 0000000000000000 000000004a0a7000 0000000000000001 [1274934.746891] r12-15 0000000040bddbc0 0000000040c0cbc0 0000000040bddbc0 0000000040bddbc0 [1274934.746891] r16-19 0000000040bde3c0 0000000040bddbc0 0000000040bde3c0 0000000000000007 [1274934.746891] r20-23 0000000000000006 000000004a368950 0000000000000000 0000000000000001 [1274934.746891] r24-27 0000000000001fff 000000000800000e 000000004a1710f0 0000000040b693c0 [1274934.746891] r28-31 0000000000000001 0000000041f988b0 0000000041f98840 000000004a171118 [1274934.746891] sr00-03 00000000066e5800 0000000000000000 0000000000000000 00000000066e5800 [1274934.746891] sr04-07 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [1274934.746891] [1274934.746891] IASQ: 0000000000000000 0000000000000000 IAOQ: 00000000406760e8 00000000406760ec [1274934.746891] IIR: 48780030 ISR: 0000000000000000 IOR: 0000004140000018 [1274934.746891] CPU: 3 CR30: 00000040e3a9c000 CR31: ffffffffffffffff [1274934.746891] ORIG_R28: 0000000040acdd58 [1274934.746891] IAOQ[0]: sba_unmap_sg+0xb0/0x118 [1274934.746891] IAOQ[1]: sba_unmap_sg+0xb4/0x118 [1274934.746891] RP(r2): sba_unmap_sg+0xac/0x118 [1274934.746891] Backtrace: [1274934.746891] [<00000000402740cc>] dma_unmap_sg_attrs+0x6c/0x70 [1274934.746891] [<000000004074d6bc>] scsi_dma_unmap+0x54/0x60 [1274934.746891] [<00000000407a3488>] mptscsih_io_done+0x150/0xd70 [1274934.746891] [<0000000040798600>] mpt_interrupt+0x168/0xa68 [1274934.746891] [<0000000040255a48>] __handle_irq_event_percpu+0xc8/0x278 [1274934.746891] [<0000000040255c34>] handle_irq_event_percpu+0x3c/0xd8 [1274934.746891] [<000000004025ecb4>] handle_percpu_irq+0xb4/0xf0 [1274934.746891] [<00000000402548e0>] generic_handle_irq+0x50/0x70 [1274934.746891] [<000000004019a254>] call_on_stack+0x18/0x24 [1274934.746891] [1274934.746891] Kernel panic - not syncing: Bad Address (null pointer deref?) The bug is caused by overrunning the sglist and incorrectly testing sg_dma_len(sglist) before nents. Normally this doesn't cause a crash, but in this case sglist crossed a page boundary. This occurs in the following code: while (sg_dma_len(sglist) && nents--) { The fix is simply to test nents first and move the decrement of nents into the loop.
AI Analysis
Technical Summary
CVE-2022-48795 is a vulnerability identified in the Linux kernel specifically affecting the parisc architecture. The issue arises from a null pointer dereference caused by an out-of-bounds access in the sba_unmap_sg function, which is part of the DMA (Direct Memory Access) unmapping process for scatter-gather lists. The root cause is an incorrect order of operations in a loop that processes scatter-gather entries: the code tests the length of the current scatter-gather segment before verifying that the number of entries (nents) has not been exhausted. This can lead to reading beyond the valid scatter-gather list boundary, especially when the list crosses a page boundary, resulting in a data TLB (Translation Lookaside Buffer) miss fault and ultimately a kernel panic due to a null pointer dereference. The vulnerability was reported with detailed kernel logs showing the fault and backtrace, indicating a crash in the dma_unmap_sg_attrs function called by SCSI driver code. The fix involves reordering the loop condition to check the number of entries first and decrementing nents inside the loop, preventing the out-of-bounds access. This vulnerability is architecture-specific (parisc) and affects Linux kernel versions including 5.15.4-gentoo-parisc64 and likely others in the parisc line. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability impacts kernel stability and availability by causing kernel panics, which can lead to denial of service on affected systems.
Potential Impact
For European organizations, the primary impact of CVE-2022-48795 is on system availability and reliability, particularly for those running Linux on parisc architecture hardware. While parisc is a niche architecture with limited deployment, organizations using legacy or specialized hardware based on HP PA-RISC processors could experience unexpected system crashes and downtime due to kernel panics triggered by this vulnerability. This could disrupt critical services, especially in sectors relying on high availability such as manufacturing, research institutions, or government agencies that may still operate legacy systems. The vulnerability does not appear to allow privilege escalation or data compromise directly, so confidentiality and integrity impacts are minimal. However, denial of service through kernel panic can affect operational continuity and may require emergency patching or system restarts. Given the rarity of the affected hardware, the overall impact on the broader European IT infrastructure is limited but significant for affected niche users.
Mitigation Recommendations
To mitigate CVE-2022-48795, European organizations should: 1) Identify any systems running Linux on parisc architecture and verify kernel versions against the fixed releases. 2) Apply the official Linux kernel patches that reorder the loop condition in sba_unmap_sg to prevent out-of-bounds access. Since this is a kernel-level fix, updating to a patched kernel version is the most effective mitigation. 3) For systems where immediate patching is not feasible, consider isolating or limiting workloads that trigger DMA unmapping operations involving scatter-gather lists to reduce the risk of kernel panic. 4) Implement robust monitoring and alerting for kernel panics and system crashes to enable rapid response. 5) Maintain regular backups and disaster recovery plans to minimize downtime impact. 6) Engage with hardware vendors or Linux distribution maintainers for backported patches if using long-term support kernels. 7) Avoid running untrusted or malformed workloads that could trigger the vulnerable code path until patched. These steps go beyond generic advice by focusing on architecture-specific identification, kernel patching, and operational controls tailored to the parisc environment.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy
CVE-2022-48795: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix data TLB miss in sba_unmap_sg Rolf Eike Beer reported the following bug: [1274934.746891] Bad Address (null pointer deref?): Code=15 (Data TLB miss fault) at addr 0000004140000018 [1274934.746891] CPU: 3 PID: 5549 Comm: cmake Not tainted 5.15.4-gentoo-parisc64 #4 [1274934.746891] Hardware name: 9000/785/C8000 [1274934.746891] [1274934.746891] YZrvWESTHLNXBCVMcbcbcbcbOGFRQPDI [1274934.746891] PSW: 00001000000001001111111000001110 Not tainted [1274934.746891] r00-03 000000ff0804fe0e 0000000040bc9bc0 00000000406760e4 0000004140000000 [1274934.746891] r04-07 0000000040b693c0 0000004140000000 000000004a2b08b0 0000000000000001 [1274934.746891] r08-11 0000000041f98810 0000000000000000 000000004a0a7000 0000000000000001 [1274934.746891] r12-15 0000000040bddbc0 0000000040c0cbc0 0000000040bddbc0 0000000040bddbc0 [1274934.746891] r16-19 0000000040bde3c0 0000000040bddbc0 0000000040bde3c0 0000000000000007 [1274934.746891] r20-23 0000000000000006 000000004a368950 0000000000000000 0000000000000001 [1274934.746891] r24-27 0000000000001fff 000000000800000e 000000004a1710f0 0000000040b693c0 [1274934.746891] r28-31 0000000000000001 0000000041f988b0 0000000041f98840 000000004a171118 [1274934.746891] sr00-03 00000000066e5800 0000000000000000 0000000000000000 00000000066e5800 [1274934.746891] sr04-07 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [1274934.746891] [1274934.746891] IASQ: 0000000000000000 0000000000000000 IAOQ: 00000000406760e8 00000000406760ec [1274934.746891] IIR: 48780030 ISR: 0000000000000000 IOR: 0000004140000018 [1274934.746891] CPU: 3 CR30: 00000040e3a9c000 CR31: ffffffffffffffff [1274934.746891] ORIG_R28: 0000000040acdd58 [1274934.746891] IAOQ[0]: sba_unmap_sg+0xb0/0x118 [1274934.746891] IAOQ[1]: sba_unmap_sg+0xb4/0x118 [1274934.746891] RP(r2): sba_unmap_sg+0xac/0x118 [1274934.746891] Backtrace: [1274934.746891] [<00000000402740cc>] dma_unmap_sg_attrs+0x6c/0x70 [1274934.746891] [<000000004074d6bc>] scsi_dma_unmap+0x54/0x60 [1274934.746891] [<00000000407a3488>] mptscsih_io_done+0x150/0xd70 [1274934.746891] [<0000000040798600>] mpt_interrupt+0x168/0xa68 [1274934.746891] [<0000000040255a48>] __handle_irq_event_percpu+0xc8/0x278 [1274934.746891] [<0000000040255c34>] handle_irq_event_percpu+0x3c/0xd8 [1274934.746891] [<000000004025ecb4>] handle_percpu_irq+0xb4/0xf0 [1274934.746891] [<00000000402548e0>] generic_handle_irq+0x50/0x70 [1274934.746891] [<000000004019a254>] call_on_stack+0x18/0x24 [1274934.746891] [1274934.746891] Kernel panic - not syncing: Bad Address (null pointer deref?) The bug is caused by overrunning the sglist and incorrectly testing sg_dma_len(sglist) before nents. Normally this doesn't cause a crash, but in this case sglist crossed a page boundary. This occurs in the following code: while (sg_dma_len(sglist) && nents--) { The fix is simply to test nents first and move the decrement of nents into the loop.
AI-Powered Analysis
Technical Analysis
CVE-2022-48795 is a vulnerability identified in the Linux kernel specifically affecting the parisc architecture. The issue arises from a null pointer dereference caused by an out-of-bounds access in the sba_unmap_sg function, which is part of the DMA (Direct Memory Access) unmapping process for scatter-gather lists. The root cause is an incorrect order of operations in a loop that processes scatter-gather entries: the code tests the length of the current scatter-gather segment before verifying that the number of entries (nents) has not been exhausted. This can lead to reading beyond the valid scatter-gather list boundary, especially when the list crosses a page boundary, resulting in a data TLB (Translation Lookaside Buffer) miss fault and ultimately a kernel panic due to a null pointer dereference. The vulnerability was reported with detailed kernel logs showing the fault and backtrace, indicating a crash in the dma_unmap_sg_attrs function called by SCSI driver code. The fix involves reordering the loop condition to check the number of entries first and decrementing nents inside the loop, preventing the out-of-bounds access. This vulnerability is architecture-specific (parisc) and affects Linux kernel versions including 5.15.4-gentoo-parisc64 and likely others in the parisc line. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability impacts kernel stability and availability by causing kernel panics, which can lead to denial of service on affected systems.
Potential Impact
For European organizations, the primary impact of CVE-2022-48795 is on system availability and reliability, particularly for those running Linux on parisc architecture hardware. While parisc is a niche architecture with limited deployment, organizations using legacy or specialized hardware based on HP PA-RISC processors could experience unexpected system crashes and downtime due to kernel panics triggered by this vulnerability. This could disrupt critical services, especially in sectors relying on high availability such as manufacturing, research institutions, or government agencies that may still operate legacy systems. The vulnerability does not appear to allow privilege escalation or data compromise directly, so confidentiality and integrity impacts are minimal. However, denial of service through kernel panic can affect operational continuity and may require emergency patching or system restarts. Given the rarity of the affected hardware, the overall impact on the broader European IT infrastructure is limited but significant for affected niche users.
Mitigation Recommendations
To mitigate CVE-2022-48795, European organizations should: 1) Identify any systems running Linux on parisc architecture and verify kernel versions against the fixed releases. 2) Apply the official Linux kernel patches that reorder the loop condition in sba_unmap_sg to prevent out-of-bounds access. Since this is a kernel-level fix, updating to a patched kernel version is the most effective mitigation. 3) For systems where immediate patching is not feasible, consider isolating or limiting workloads that trigger DMA unmapping operations involving scatter-gather lists to reduce the risk of kernel panic. 4) Implement robust monitoring and alerting for kernel panics and system crashes to enable rapid response. 5) Maintain regular backups and disaster recovery plans to minimize downtime impact. 6) Engage with hardware vendors or Linux distribution maintainers for backported patches if using long-term support kernels. 7) Avoid running untrusted or malformed workloads that could trigger the vulnerable code path until patched. These steps go beyond generic advice by focusing on architecture-specific identification, kernel patching, and operational controls tailored to the parisc environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-16T11:38:08.895Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe61c7
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 9:40:40 PM
Last updated: 8/17/2025, 1:44:40 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.