Skip to main content

CVE-2022-49172: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49172cvecve-2022-49172
Published: Wed Feb 26 2025 (02/26/2025, 01:55:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: parisc: Fix non-access data TLB cache flush faults When a page is not present, we get non-access data TLB faults from the fdc and fic instructions in flush_user_dcache_range_asm and flush_user_icache_range_asm. When these occur, the cache line is not invalidated and potentially we get memory corruption. The problem was hidden by the nullification of the flush instructions. These faults also affect performance. With pa8800/pa8900 processors, there will be 32 faults per 4 KB page since the cache line is 128 bytes. There will be more faults with earlier processors. The problem is fixed by using flush_cache_pages(). It does the flush using a tmp alias mapping. The flush_cache_pages() call in flush_cache_range() flushed too large a range. V2: Remove unnecessary preempt_disable() and preempt_enable() calls.

AI-Powered Analysis

AILast updated: 06/30/2025, 03:42:59 UTC

Technical Analysis

CVE-2022-49172 is a vulnerability identified in the Linux kernel specifically affecting the PA-RISC (parisc) architecture processors such as the pa8800 and pa8900. The issue arises from improper handling of non-access data Translation Lookaside Buffer (TLB) cache flush faults during the execution of flush instructions in the functions flush_user_dcache_range_asm and flush_user_icache_range_asm. When a memory page is not present, these instructions cause non-access data TLB faults, but the cache line is not invalidated as expected. This leads to potential memory corruption because stale cache lines may remain valid despite the underlying memory page being absent or changed. Additionally, these faults degrade system performance significantly, with up to 32 faults per 4 KB page on affected processors due to the 128-byte cache line size, and even more faults on earlier PA-RISC processors. The vulnerability was addressed by replacing the flawed flush instructions with a call to flush_cache_pages(), which uses a temporary alias mapping to correctly flush cache lines. Furthermore, the patch refined the flush_cache_range() function to avoid flushing unnecessarily large memory ranges and removed redundant preempt_disable() and preempt_enable() calls to optimize kernel behavior. This vulnerability is architecture-specific and does not affect the more common x86 or ARM Linux kernel builds. No known exploits are reported in the wild, and no CVSS score has been assigned to date.

Potential Impact

For European organizations running Linux systems on PA-RISC hardware, this vulnerability poses risks of memory corruption that could lead to system instability, data integrity issues, or crashes. Although PA-RISC systems are relatively niche and legacy, they may still be in use in specialized industrial, governmental, or research environments. The performance degradation caused by repeated TLB faults could also impact critical workloads, reducing system responsiveness and throughput. Memory corruption vulnerabilities can sometimes be leveraged to escalate privileges or execute arbitrary code, but this specific flaw appears to be more related to stability and performance rather than direct remote exploitation. Given the lack of known exploits and the specialized hardware affected, the immediate threat level is moderate. However, organizations relying on these systems for critical operations should prioritize patching to avoid unexpected downtime or data loss.

Mitigation Recommendations

1. Identify and inventory all Linux systems running on PA-RISC architecture within the organization to assess exposure. 2. Apply the official Linux kernel patches that address CVE-2022-49172 as soon as they become available from trusted Linux kernel maintainers or distributions supporting PA-RISC. 3. If patching is not immediately feasible, consider isolating affected systems from critical networks to reduce risk. 4. Monitor system logs for unusual cache fault patterns or performance degradation that could indicate exploitation or manifestation of the vulnerability. 5. Engage with hardware and software vendors for any additional firmware or microcode updates that may complement the kernel patch. 6. Implement rigorous backup and recovery procedures for affected systems to mitigate potential data corruption consequences. 7. For environments where PA-RISC systems are legacy and no longer supported, plan for migration to more modern and supported hardware platforms to reduce future risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.279Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe514f

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 3:42:59 AM

Last updated: 7/26/2025, 3:59:33 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats