
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49081 affects the Linux kernel's highmem subsystem, specifically in the _kmaplocalsched{in,out} functions. The vulnerability was discovered when CONFIGDEBUGKMAPLOCAL is enabled, where the checks for unmapped slots in tsk->kmapctrl.pteval were incorrectly implemented (Kernel Git).
The vulnerability stems from a mismatch between initialization and verification methods. The slots are initialized with 0 value, but the check is performed using ptenone() instead of checking the actual value. This becomes problematic because a 0 PTE doesn't necessarily mean ptenone() will return true, particularly on architectures like xtensa where it returns false (Debian Tracker).
When triggered, the vulnerability results in runtime warnings and potential system instability. The issue manifests through warning messages in the kernel log, particularly affecting systems with CONFIGDEBUGKMAP_LOCAL enabled (Ubuntu Security).
The fix involves replacing !ptenone(pteval) with pteval(pteval) != 0 in the affected code. This patch has been merged into the mainline kernel and backported to stable versions. Various distributions have released updated kernel packages incorporating this fix (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."