In the Linux kernel, the following vulnerability has been resolved:
arm64: set UXN on swapper page tables
[ This issue was fixed upstream by accident in c3cee924bd85 ("arm64: head: cover entire kernel image in initial ID map") as part of a large refactoring of the arm64 boot flow. This simple fix is therefore preferred for -stable backporting ]
On a system that implements FEATEPAN, read/write access to the idmap is denied because UXN is not set on the swapper PTEs. As a result, idmapkptiinstallngmappings panics the kernel when accessing _idmapkptiflag. Fix it by setting UXN on these PTEs.
[ { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3cee924bd855184d15bc4aa6088dcf8e2c1394c", "signature_version": "v1", "target": { "function": "paging_init", "file": "arch/arm64/mm/mmu.c" }, "digest": { "function_hash": "82330200697673335372597973066776512225", "length": 426.0 }, "id": "CVE-2022-50230-38538c76" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3cee924bd855184d15bc4aa6088dcf8e2c1394c", "signature_version": "v1", "target": { "file": "arch/arm64/mm/mmu.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "34028416160447483806562655426375619884", "190388467713600494622170557177536062951", "227617969726944583763367795325012702099", "187820742443352735330060647117127422275", "290769937157585924455781113617212255631", "90484158722437318461048618202179289178", "18897070344871461206673163287671936908", "77815837401738578080405817767593518597", "6793914066014216538223593355057246032", "171063294696719585450134581695722801252", "270096704480498375689434467625264803671", "39384581313273946389704356714930359713", "232027824551155305080313411277133577849", "57854298232146873278227890625531748900" ] }, "id": "CVE-2022-50230-790e998f" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c3cee924bd855184d15bc4aa6088dcf8e2c1394c", "signature_version": "v1", "target": { "file": "arch/arm64/include/asm/kernel-pgtable.h" }, "digest": { "threshold": 0.9, "line_hashes": [ "327892130325109029480489297356604233283", "71734388821128010166035172852462043457", "320215778404595278949868419242003230701", "115584937378444169183098770577973031319", "324723549656773592822040310492005512954", "270638501489813482845755054250527356689", "214970271167890379189281136852339058027", "327892130325109029480489297356604233283", "71734388821128010166035172852462043457", "233557843046479140734566775282309524309", "319358207898728010128483523687495315903" ] }, "id": "CVE-2022-50230-e1095a00" } ]