CVE-2022-48795

Source
https://cve.org/CVERecord?id=CVE-2022-48795
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48795.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48795
Downstream
Published
2024-07-16T11:43:50.129Z
Modified
2026-04-11T12:41:18.617850Z
Summary
parisc: Fix data TLB miss in sba_unmap_sg
Details

In the Linux kernel, the following vulnerability has been resolved:

parisc: Fix data TLB miss in sbaunmapsg

Rolf Eike Beer reported the following bug:

[1274934.746891] Bad Address (null pointer deref?): Code=15 (Data TLB miss fault) at addr 0000004140000018 [1274934.746891] CPU: 3 PID: 5549 Comm: cmake Not tainted 5.15.4-gentoo-parisc64 #4 [1274934.746891] Hardware name: 9000/785/C8000 [1274934.746891] [1274934.746891] YZrvWESTHLNXBCVMcbcbcbcbOGFRQPDI [1274934.746891] PSW: 00001000000001001111111000001110 Not tainted [1274934.746891] r00-03 000000ff0804fe0e 0000000040bc9bc0 00000000406760e4 0000004140000000 [1274934.746891] r04-07 0000000040b693c0 0000004140000000 000000004a2b08b0 0000000000000001 [1274934.746891] r08-11 0000000041f98810 0000000000000000 000000004a0a7000 0000000000000001 [1274934.746891] r12-15 0000000040bddbc0 0000000040c0cbc0 0000000040bddbc0 0000000040bddbc0 [1274934.746891] r16-19 0000000040bde3c0 0000000040bddbc0 0000000040bde3c0 0000000000000007 [1274934.746891] r20-23 0000000000000006 000000004a368950 0000000000000000 0000000000000001 [1274934.746891] r24-27 0000000000001fff 000000000800000e 000000004a1710f0 0000000040b693c0 [1274934.746891] r28-31 0000000000000001 0000000041f988b0 0000000041f98840 000000004a171118 [1274934.746891] sr00-03 00000000066e5800 0000000000000000 0000000000000000 00000000066e5800 [1274934.746891] sr04-07 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [1274934.746891] [1274934.746891] IASQ: 0000000000000000 0000000000000000 IAOQ: 00000000406760e8 00000000406760ec [1274934.746891] IIR: 48780030 ISR: 0000000000000000 IOR: 0000004140000018 [1274934.746891] CPU: 3 CR30: 00000040e3a9c000 CR31: ffffffffffffffff [1274934.746891] ORIGR28: 0000000040acdd58 [1274934.746891] RP(r2): sbaunmapsg+0xac/0x118 [1274934.746891] Backtrace: [1274934.746891] [<00000000402740cc>] dmaunmapsgattrs+0x6c/0x70 [1274934.746891] [<000000004074d6bc>] scsidmaunmap+0x54/0x60 [1274934.746891] [<00000000407a3488>] mptscsihiodone+0x150/0xd70 [1274934.746891] [<0000000040798600>] mpt_interrupt+0x168/0xa68 [1274934.746891] [<0000000040255a48>] __handleirqeventpercpu+0xc8/0x278 [1274934.746891] [<0000000040255c34>] handleirqeventpercpu+0x3c/0xd8 [1274934.746891] [<000000004025ecb4>] handlepercpuirq+0xb4/0xf0 [1274934.746891] [<00000000402548e0>] generichandleirq+0x50/0x70 [1274934.746891] [<000000004019a254>] callonstack+0x18/0x24 [1274934.746891] [1274934.746891] Kernel panic - not syncing: Bad Address (null pointer deref?)

The bug is caused by overrunning the sglist and incorrectly testing sgdmalen(sglist) before nents. Normally this doesn't cause a crash, but in this case sglist crossed a page boundary. This occurs in the following code:

while (sg_dma_len(sglist) && nents--) {

The fix is simply to test nents first and move the decrement of nents into the loop.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48795.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
f23f0444ead4d941165aa82ce2fcbb997dc00e97
Fixed
de75676ee99bf9f25b1124ff301b3f7b8ba597d4
Fixed
867e50231c7605547d9334904d70a181f39f2d9e
Fixed
efccc9b0c7e28d0eb7918a236e59f60dc23db4c3
Fixed
f8f519d7df66c334b5e08f896ac70ee3b53add3b
Fixed
8c8e949ae81e7f5ab58f9f9f8e9b573b93173dd2
Fixed
e40ae3133ed87d6d526f3c8fc6a5f9a2d72dcdbf
Fixed
b7d6f44a0fa716a82969725516dc0b16bc7cd514

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48795.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
4.9.303
Type
ECOSYSTEM
Events
Introduced
4.10.0
Fixed
4.14.268
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.231
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.181
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.102
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.25
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.11

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48795.json"