CVE-2022-49004: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: riscv: Sync efi page table's kernel mappings before switching The EFI page table is initially created as a copy of the kernel page table. With VMAP_STACK enabled, kernel stacks are allocated in the vmalloc area: if the stack is allocated in a new PGD (one that was not present at the moment of the efi page table creation or not synced in a previous vmalloc fault), the kernel will take a trap when switching to the efi page table when the vmalloc kernel stack is accessed, resulting in a kernel panic. Fix that by updating the efi kernel mappings before switching to the efi page table.
AI Analysis
Technical Summary
CVE-2022-49004 is a vulnerability identified in the Linux kernel specifically affecting the RISC-V architecture implementation of EFI (Extensible Firmware Interface) page table management. The EFI page table is initially created as a copy of the kernel page table. When VMAP_STACK is enabled, kernel stacks are allocated in the vmalloc area, which may involve new Page Global Directories (PGDs) that were not present or synchronized at the time of EFI page table creation. If a kernel stack is allocated in such a new PGD, the kernel may encounter a trap when switching to the EFI page table and accessing the vmalloc kernel stack, resulting in a kernel panic. This occurs because the EFI page table's kernel mappings are not updated or synchronized before the switch, leading to invalid memory access. The fix involves updating the EFI kernel mappings before switching to the EFI page table to ensure consistency and prevent the kernel panic. This vulnerability is specific to the Linux kernel on RISC-V platforms with VMAP_STACK enabled and affects kernel stability by causing a denial of service through kernel panics. There are no known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability was published on October 21, 2024, and is considered resolved in updated kernel versions.
Potential Impact
The primary impact of CVE-2022-49004 is a denial of service (DoS) condition due to kernel panics on affected Linux systems running on RISC-V architecture with VMAP_STACK enabled. For European organizations, this could disrupt critical services and infrastructure relying on such Linux systems, particularly in sectors adopting RISC-V hardware for embedded systems, IoT devices, or specialized computing environments. While RISC-V adoption is currently limited compared to x86 or ARM, its growth in industrial automation, telecommunications, and research institutions in Europe could expose these organizations to unexpected system crashes, leading to downtime, loss of availability, and potential operational disruptions. Since the vulnerability does not appear to allow privilege escalation or code execution, confidentiality and integrity impacts are minimal. However, the availability impact can be significant if exploited or triggered unintentionally, especially in environments requiring high reliability and uptime.
Mitigation Recommendations
To mitigate CVE-2022-49004, European organizations should: 1) Ensure Linux kernel versions are updated to the latest patched releases that include the fix for this vulnerability, especially on RISC-V systems with VMAP_STACK enabled. 2) Audit and identify all RISC-V based Linux systems in their environment to assess exposure. 3) Disable VMAP_STACK if feasible and if it does not impact system functionality, as this feature is central to the vulnerability. 4) Implement robust monitoring for kernel panics and system crashes to detect potential exploitation or triggering of this issue. 5) For critical systems, consider isolating or limiting exposure of RISC-V Linux hosts until patches are applied. 6) Engage with hardware and software vendors to confirm support and patch availability for RISC-V platforms. 7) Incorporate this vulnerability into incident response and risk management frameworks to prepare for potential availability impacts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2022-49004: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: riscv: Sync efi page table's kernel mappings before switching The EFI page table is initially created as a copy of the kernel page table. With VMAP_STACK enabled, kernel stacks are allocated in the vmalloc area: if the stack is allocated in a new PGD (one that was not present at the moment of the efi page table creation or not synced in a previous vmalloc fault), the kernel will take a trap when switching to the efi page table when the vmalloc kernel stack is accessed, resulting in a kernel panic. Fix that by updating the efi kernel mappings before switching to the efi page table.
AI-Powered Analysis
Technical Analysis
CVE-2022-49004 is a vulnerability identified in the Linux kernel specifically affecting the RISC-V architecture implementation of EFI (Extensible Firmware Interface) page table management. The EFI page table is initially created as a copy of the kernel page table. When VMAP_STACK is enabled, kernel stacks are allocated in the vmalloc area, which may involve new Page Global Directories (PGDs) that were not present or synchronized at the time of EFI page table creation. If a kernel stack is allocated in such a new PGD, the kernel may encounter a trap when switching to the EFI page table and accessing the vmalloc kernel stack, resulting in a kernel panic. This occurs because the EFI page table's kernel mappings are not updated or synchronized before the switch, leading to invalid memory access. The fix involves updating the EFI kernel mappings before switching to the EFI page table to ensure consistency and prevent the kernel panic. This vulnerability is specific to the Linux kernel on RISC-V platforms with VMAP_STACK enabled and affects kernel stability by causing a denial of service through kernel panics. There are no known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability was published on October 21, 2024, and is considered resolved in updated kernel versions.
Potential Impact
The primary impact of CVE-2022-49004 is a denial of service (DoS) condition due to kernel panics on affected Linux systems running on RISC-V architecture with VMAP_STACK enabled. For European organizations, this could disrupt critical services and infrastructure relying on such Linux systems, particularly in sectors adopting RISC-V hardware for embedded systems, IoT devices, or specialized computing environments. While RISC-V adoption is currently limited compared to x86 or ARM, its growth in industrial automation, telecommunications, and research institutions in Europe could expose these organizations to unexpected system crashes, leading to downtime, loss of availability, and potential operational disruptions. Since the vulnerability does not appear to allow privilege escalation or code execution, confidentiality and integrity impacts are minimal. However, the availability impact can be significant if exploited or triggered unintentionally, especially in environments requiring high reliability and uptime.
Mitigation Recommendations
To mitigate CVE-2022-49004, European organizations should: 1) Ensure Linux kernel versions are updated to the latest patched releases that include the fix for this vulnerability, especially on RISC-V systems with VMAP_STACK enabled. 2) Audit and identify all RISC-V based Linux systems in their environment to assess exposure. 3) Disable VMAP_STACK if feasible and if it does not impact system functionality, as this feature is central to the vulnerability. 4) Implement robust monitoring for kernel panics and system crashes to detect potential exploitation or triggering of this issue. 5) For critical systems, consider isolating or limiting exposure of RISC-V Linux hosts until patches are applied. 6) Engage with hardware and software vendors to confirm support and patch availability for RISC-V platforms. 7) Incorporate this vulnerability into incident response and risk management frameworks to prepare for potential availability impacts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.643Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe68b0
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 12:58:54 AM
Last updated: 8/14/2025, 4:37:14 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.