
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49562 affects the Linux kernel's KVM (Kernel-based Virtual Machine) x86 implementation. The vulnerability is related to how guest PTE (Page Table Entry) A/D (Accessed/Dirty) bits are updated. The issue stems from a broken VM_PFNMAP path that incorrectly assumes vm_pgoff is the base pfn of the mapped VMA range, when it actually represents the offset relative to the file (Kernel Commit).
The vulnerability exists in the kernel's handling of PFNs (Page Frame Numbers) outside of kernel reach when touching GPTEs (Guest Page Table Entries). The issue specifically relates to a conceptual error in the VM_PFNMAP path where vm_pgoff is incorrectly treated as the base pfn of the mapped VMA range. While this implementation worked for the original use case of backing guest memory with /dev/mem, it leads to accessing random pfns for other VM_PFNMAP cases (Kernel Commit).
When exploited, this vulnerability could lead to accessing incorrect page frame numbers in the system, potentially causing memory corruption or system instability. The issue particularly affects systems using KVM virtualization with specific memory mapping configurations (Kernel Commit).
The fix involves using the __try_cmpxchg_user() function to update guest PTE A/D bits instead of mapping the PTE into kernel address space. This change resolves the incorrect handling of PFNs in the VM_PFNMAP path (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."