In the Linux kernel, the following vulnerability has been resolved:
arm64: set UXN on swapper page tables
[ This issue was fixed upstream by accident in c3cee924bd85 ("arm64:
head: cover entire kernel image in initial ID map") as part of a
large refactoring of the arm64 boot flow. This simple fix is therefore
preferred for -stable backporting ]
On a system that implements FEAT_EPAN, read/write access to the idmap
is denied because UXN is not set on the swapper PTEs. As a result,
idmap_kpti_install_ng_mappings panics the kernel when accessing
__idmap_kpti_flag. Fix it by setting UXN on these PTEs.
References
Configurations
Configuration 1 (hide)
|
History
19 Nov 2025, 12:57
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/775871d4be0d75e219cca937af843a4a1b60489a - Patch | |
| References | () https://git.kernel.org/stable/c/c3cee924bd855184d15bc4aa6088dcf8e2c1394c - Patch |
Information
Published : 2025-06-18 11:15
Updated : 2025-11-19 12:57
NVD link : CVE-2022-50232
Mitre link : CVE-2022-50232
CVE.ORG link : CVE-2022-50232
JSON object : View
Products Affected
linux
- linux_kernel
CWE
