CVE-2022-48991: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't keep accessing pages which aren't mapped anymore. Secondary MMUs don't hold their own references to pages that are mirrored over, so failing to notify them can lead to page use-after-free. I'm marking this as addressing an issue introduced in commit f3f0e1d2150b ("khugepaged: add support of collapse for tmpfs/shmem pages"), but most of the security impact of this only came in commit 27e1f8273113 ("khugepaged: enable collapse pmd for pte-mapped THP"), which actually omitted flushes for the removal of present PTEs, not just for the removal of empty page tables.
AI Analysis
Technical Summary
CVE-2022-48991 is a vulnerability in the Linux kernel related to the handling of huge pages (Transparent Huge Pages - THP) in the memory management subsystem, specifically within the khugepaged component. The issue arises from improper invocation of Memory Management Unit (MMU) notifiers during the collapse of shared memory (shmem) or tmpfs file-backed pages. When page table entries (PTEs) are invalidated or removed, the kernel must notify secondary MMUs, such as those used by virtualization technologies like KVM, to prevent them from accessing pages that are no longer mapped. The vulnerability was introduced by a commit that added support for collapsing tmpfs/shmem pages and was exacerbated by a subsequent commit enabling collapse of PMD (Page Middle Directory) entries for PTE-mapped THP. These changes omitted necessary flushes and notifications, leading to a use-after-free condition where secondary MMUs might continue to access freed memory pages. This can cause memory corruption, potential privilege escalation, or system instability. Although no known exploits are currently reported in the wild, the flaw affects Linux kernel versions containing the specified commits and requires patching to prevent exploitation. The vulnerability is subtle and relates to low-level kernel memory management and virtualization interactions, making it a significant concern for environments running virtualized workloads on Linux hosts.
Potential Impact
For European organizations, the impact of CVE-2022-48991 can be substantial, especially those relying heavily on Linux-based infrastructure and virtualization platforms such as KVM. Exploitation could lead to memory corruption and use-after-free conditions, potentially allowing attackers to execute arbitrary code with kernel privileges or cause denial of service through system crashes. This risk is particularly critical for cloud service providers, data centers, and enterprises running virtualized environments or containerized workloads on Linux hosts. Confidentiality, integrity, and availability of systems could be compromised, affecting sensitive data and critical services. Given the widespread use of Linux in European public sector, financial institutions, and technology companies, unpatched systems could be targeted to gain unauthorized access or disrupt operations. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2022-48991. Since the vulnerability stems from kernel commits, applying official kernel patches or upgrading to the latest stable kernel releases from trusted Linux distributions is essential. Organizations using virtualization platforms like KVM should ensure their hypervisor and guest management tools are also updated to handle MMU notifier interactions correctly. Additionally, implementing strict access controls and monitoring for unusual kernel or memory-related behavior can help detect exploitation attempts. For environments where immediate patching is challenging, consider isolating vulnerable hosts, limiting access to trusted users, and employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and seccomp filters to reduce attack surface. Regularly auditing kernel versions and maintaining a robust patch management process tailored to Linux systems will mitigate risks associated with this and similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-48991: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't keep accessing pages which aren't mapped anymore. Secondary MMUs don't hold their own references to pages that are mirrored over, so failing to notify them can lead to page use-after-free. I'm marking this as addressing an issue introduced in commit f3f0e1d2150b ("khugepaged: add support of collapse for tmpfs/shmem pages"), but most of the security impact of this only came in commit 27e1f8273113 ("khugepaged: enable collapse pmd for pte-mapped THP"), which actually omitted flushes for the removal of present PTEs, not just for the removal of empty page tables.
AI-Powered Analysis
Technical Analysis
CVE-2022-48991 is a vulnerability in the Linux kernel related to the handling of huge pages (Transparent Huge Pages - THP) in the memory management subsystem, specifically within the khugepaged component. The issue arises from improper invocation of Memory Management Unit (MMU) notifiers during the collapse of shared memory (shmem) or tmpfs file-backed pages. When page table entries (PTEs) are invalidated or removed, the kernel must notify secondary MMUs, such as those used by virtualization technologies like KVM, to prevent them from accessing pages that are no longer mapped. The vulnerability was introduced by a commit that added support for collapsing tmpfs/shmem pages and was exacerbated by a subsequent commit enabling collapse of PMD (Page Middle Directory) entries for PTE-mapped THP. These changes omitted necessary flushes and notifications, leading to a use-after-free condition where secondary MMUs might continue to access freed memory pages. This can cause memory corruption, potential privilege escalation, or system instability. Although no known exploits are currently reported in the wild, the flaw affects Linux kernel versions containing the specified commits and requires patching to prevent exploitation. The vulnerability is subtle and relates to low-level kernel memory management and virtualization interactions, making it a significant concern for environments running virtualized workloads on Linux hosts.
Potential Impact
For European organizations, the impact of CVE-2022-48991 can be substantial, especially those relying heavily on Linux-based infrastructure and virtualization platforms such as KVM. Exploitation could lead to memory corruption and use-after-free conditions, potentially allowing attackers to execute arbitrary code with kernel privileges or cause denial of service through system crashes. This risk is particularly critical for cloud service providers, data centers, and enterprises running virtualized environments or containerized workloads on Linux hosts. Confidentiality, integrity, and availability of systems could be compromised, affecting sensitive data and critical services. Given the widespread use of Linux in European public sector, financial institutions, and technology companies, unpatched systems could be targeted to gain unauthorized access or disrupt operations. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2022-48991. Since the vulnerability stems from kernel commits, applying official kernel patches or upgrading to the latest stable kernel releases from trusted Linux distributions is essential. Organizations using virtualization platforms like KVM should ensure their hypervisor and guest management tools are also updated to handle MMU notifier interactions correctly. Additionally, implementing strict access controls and monitoring for unusual kernel or memory-related behavior can help detect exploitation attempts. For environments where immediate patching is challenging, consider isolating vulnerable hosts, limiting access to trusted users, and employing kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and seccomp filters to reduce attack surface. Regularly auditing kernel versions and maintaining a robust patch management process tailored to Linux systems will mitigate risks associated with this and similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.636Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe684d
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 12:55:52 AM
Last updated: 8/17/2025, 6:44:47 AM
Views: 22
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.