
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49623 affects the Linux kernel's PowerPC XIVE/sPAPR implementation. The vulnerability was discovered in the bitmap allocation size handling where KASAN detected access beyond the end of the xibm->bitmap allocation. This occurs because the allocation uses the wrong unit (bits) when it should pass (BITS_TO_LONGS(count) * sizeof(long)) or equivalent (Kernel Git).
The vulnerability manifests as a slab-out-of-bounds read in _find_first_zero_bit+0x40/0x140. With small numbers of bits, the allocated object can be smaller than sizeof(long), which results in invalid accesses. The issue occurs during system initialization when setting up CPU IPIs (Inter-Processor Interrupts) (Kernel Git).
The vulnerability could lead to memory corruption due to out-of-bounds memory access, potentially causing system instability or crashes. The issue is particularly concerning as it occurs during system initialization when setting up critical interrupt handling infrastructure (Kernel Git).
The issue has been fixed by replacing kzalloc() with bitmap_zalloc() to properly allocate and initialize the IRQ bitmap, paired with bitmap_free() for consistency. Users should update to a patched kernel version that includes this fix (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."