
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability was discovered in the mm/hugetlb component affecting the hugetlbchangeprotection() function. The issue was related to incorrect handling of PTE markers in the context of userfaultfd write-protection (uffd-wp) operations. This vulnerability was assigned CVE-2022-49760 and was disclosed in March 2025 (NVD).
The vulnerability stems from two problematic cases in hugetlbchangeprotection() when handling PTE markers: 1) When protecting an uffd-wp PTE marker a second time using uffd-wp, leading to corruption of the PTE marker in the '!hugeptenone(pte)' case, and 2) When unprotecting a uffd-wp PTE marker, where a stale PTE value causes incorrect handling. These issues could result in treating corrupted PTE markers as present PTEs mapping invalid pages (NVD).
The vulnerability could be triggered through specific operations such as mapping a memfd backed by huge pages, registering uffd-wp, and performing certain operations like uffd-wp'ing an unmapped page multiple times or unregistering uffd-wp. When exploited, it could lead to system crashes through VMBUGON assertions and potential memory corruption (NVD).
The vulnerability has been resolved through patches in the Linux kernel. Two specific commits were created to address the issue: one fixing the immediate test case and another addressing potential issues with migration entries (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."