CVE-2022-49172: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix non-access data TLB cache flush faults When a page is not present, we get non-access data TLB faults from the fdc and fic instructions in flush_user_dcache_range_asm and flush_user_icache_range_asm. When these occur, the cache line is not invalidated and potentially we get memory corruption. The problem was hidden by the nullification of the flush instructions. These faults also affect performance. With pa8800/pa8900 processors, there will be 32 faults per 4 KB page since the cache line is 128 bytes. There will be more faults with earlier processors. The problem is fixed by using flush_cache_pages(). It does the flush using a tmp alias mapping. The flush_cache_pages() call in flush_cache_range() flushed too large a range. V2: Remove unnecessary preempt_disable() and preempt_enable() calls.
AI Analysis
Technical Summary
CVE-2022-49172 is a vulnerability identified in the Linux kernel specifically affecting the PA-RISC (parisc) architecture processors such as the pa8800 and pa8900. The issue arises from improper handling of non-access data Translation Lookaside Buffer (TLB) cache flush faults during the execution of flush instructions in the functions flush_user_dcache_range_asm and flush_user_icache_range_asm. When a memory page is not present, these instructions cause non-access data TLB faults, but the cache line is not invalidated as expected. This leads to potential memory corruption because stale cache lines may remain valid despite the underlying memory page being absent or changed. Additionally, these faults degrade system performance significantly, with up to 32 faults per 4 KB page on affected processors due to the 128-byte cache line size, and even more faults on earlier PA-RISC processors. The vulnerability was addressed by replacing the flawed flush instructions with a call to flush_cache_pages(), which uses a temporary alias mapping to correctly flush cache lines. Furthermore, the patch refined the flush_cache_range() function to avoid flushing unnecessarily large memory ranges and removed redundant preempt_disable() and preempt_enable() calls to optimize kernel behavior. This vulnerability is architecture-specific and does not affect the more common x86 or ARM Linux kernel builds. No known exploits are reported in the wild, and no CVSS score has been assigned to date.
Potential Impact
For European organizations running Linux systems on PA-RISC hardware, this vulnerability poses risks of memory corruption that could lead to system instability, data integrity issues, or crashes. Although PA-RISC systems are relatively niche and legacy, they may still be in use in specialized industrial, governmental, or research environments. The performance degradation caused by repeated TLB faults could also impact critical workloads, reducing system responsiveness and throughput. Memory corruption vulnerabilities can sometimes be leveraged to escalate privileges or execute arbitrary code, but this specific flaw appears to be more related to stability and performance rather than direct remote exploitation. Given the lack of known exploits and the specialized hardware affected, the immediate threat level is moderate. However, organizations relying on these systems for critical operations should prioritize patching to avoid unexpected downtime or data loss.
Mitigation Recommendations
1. Identify and inventory all Linux systems running on PA-RISC architecture within the organization to assess exposure. 2. Apply the official Linux kernel patches that address CVE-2022-49172 as soon as they become available from trusted Linux kernel maintainers or distributions supporting PA-RISC. 3. If patching is not immediately feasible, consider isolating affected systems from critical networks to reduce risk. 4. Monitor system logs for unusual cache fault patterns or performance degradation that could indicate exploitation or manifestation of the vulnerability. 5. Engage with hardware and software vendors for any additional firmware or microcode updates that may complement the kernel patch. 6. Implement rigorous backup and recovery procedures for affected systems to mitigate potential data corruption consequences. 7. For environments where PA-RISC systems are legacy and no longer supported, plan for migration to more modern and supported hardware platforms to reduce future risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2022-49172: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix non-access data TLB cache flush faults When a page is not present, we get non-access data TLB faults from the fdc and fic instructions in flush_user_dcache_range_asm and flush_user_icache_range_asm. When these occur, the cache line is not invalidated and potentially we get memory corruption. The problem was hidden by the nullification of the flush instructions. These faults also affect performance. With pa8800/pa8900 processors, there will be 32 faults per 4 KB page since the cache line is 128 bytes. There will be more faults with earlier processors. The problem is fixed by using flush_cache_pages(). It does the flush using a tmp alias mapping. The flush_cache_pages() call in flush_cache_range() flushed too large a range. V2: Remove unnecessary preempt_disable() and preempt_enable() calls.
AI-Powered Analysis
Technical Analysis
CVE-2022-49172 is a vulnerability identified in the Linux kernel specifically affecting the PA-RISC (parisc) architecture processors such as the pa8800 and pa8900. The issue arises from improper handling of non-access data Translation Lookaside Buffer (TLB) cache flush faults during the execution of flush instructions in the functions flush_user_dcache_range_asm and flush_user_icache_range_asm. When a memory page is not present, these instructions cause non-access data TLB faults, but the cache line is not invalidated as expected. This leads to potential memory corruption because stale cache lines may remain valid despite the underlying memory page being absent or changed. Additionally, these faults degrade system performance significantly, with up to 32 faults per 4 KB page on affected processors due to the 128-byte cache line size, and even more faults on earlier PA-RISC processors. The vulnerability was addressed by replacing the flawed flush instructions with a call to flush_cache_pages(), which uses a temporary alias mapping to correctly flush cache lines. Furthermore, the patch refined the flush_cache_range() function to avoid flushing unnecessarily large memory ranges and removed redundant preempt_disable() and preempt_enable() calls to optimize kernel behavior. This vulnerability is architecture-specific and does not affect the more common x86 or ARM Linux kernel builds. No known exploits are reported in the wild, and no CVSS score has been assigned to date.
Potential Impact
For European organizations running Linux systems on PA-RISC hardware, this vulnerability poses risks of memory corruption that could lead to system instability, data integrity issues, or crashes. Although PA-RISC systems are relatively niche and legacy, they may still be in use in specialized industrial, governmental, or research environments. The performance degradation caused by repeated TLB faults could also impact critical workloads, reducing system responsiveness and throughput. Memory corruption vulnerabilities can sometimes be leveraged to escalate privileges or execute arbitrary code, but this specific flaw appears to be more related to stability and performance rather than direct remote exploitation. Given the lack of known exploits and the specialized hardware affected, the immediate threat level is moderate. However, organizations relying on these systems for critical operations should prioritize patching to avoid unexpected downtime or data loss.
Mitigation Recommendations
1. Identify and inventory all Linux systems running on PA-RISC architecture within the organization to assess exposure. 2. Apply the official Linux kernel patches that address CVE-2022-49172 as soon as they become available from trusted Linux kernel maintainers or distributions supporting PA-RISC. 3. If patching is not immediately feasible, consider isolating affected systems from critical networks to reduce risk. 4. Monitor system logs for unusual cache fault patterns or performance degradation that could indicate exploitation or manifestation of the vulnerability. 5. Engage with hardware and software vendors for any additional firmware or microcode updates that may complement the kernel patch. 6. Implement rigorous backup and recovery procedures for affected systems to mitigate potential data corruption consequences. 7. For environments where PA-RISC systems are legacy and no longer supported, plan for migration to more modern and supported hardware platforms to reduce future risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.279Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe514f
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 3:42:59 AM
Last updated: 7/26/2025, 3:59:33 PM
Views: 10
Related Threats
CVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-55150: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.