CVE-2022-49744

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49744
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49744.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49744
Downstream
Published
2025-03-27T16:42:54Z
Modified
2025-10-16T00:11:09.944324Z
Summary
mm/uffd: fix pte marker when fork() without fork event
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/uffd: fix pte marker when fork() without fork event

Patch series "mm: Fixes on pte markers".

Patch 1 resolves the syzkiller report from Pengfei.

Patch 2 further harden pte markers when used with the recent swapin error markers. The major case is we should persist a swapin error marker after fork(), so child shouldn't read a corrupted page.

This patch (of 2):

When fork(), dstvma is not guaranteed to have VMUFFD_WP even if src may have it and has pte marker installed. The warning is improper along with the comment. The right thing is to inherit the pte marker when needed, or keep the dst pte empty.

A vague guess is this happened by an accident when there's the prior patch to introduce src/dst vma into this helper during the uffd-wp feature got developed and I probably messed up in the rebase, since if we replace dstvma with srcvma the warning & comment it all makes sense too.

Hugetlb did exactly the right here (copyhugetlbpage_range()). Fix the general path.

Reproducer:

https://github.com/xupengfe/syzkallerlogs/blob/main/221208115556copypage_range/repro.c

Bugzilla report: https://bugzilla.kernel.org/show_bug.cgi?id=216808

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c56d1b62cce83695823c13e52f73e92eb568c0c1
Fixed
2d11727655bf931776fb541f5862daf04bd5bf02
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c56d1b62cce83695823c13e52f73e92eb568c0c1
Fixed
49d6d7fb631345b0f2957a7c4be24ad63903150f

Affected versions

v5.*

v5.18
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.2
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.19.0
Fixed
6.1.11