Input validation error in Linux kernel mm



| Updated: 2025-05-12
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-48991
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Input validation error

EUVDB-ID: #VU99215

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48991

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the retract_page_tables() function in mm/khugepaged.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.9 - 6.1 rc7

CPE2.3 External links

https://git.kernel.org/stable/c/275c626c131cfe141beeb6c575e31fa53d32da19
https://git.kernel.org/stable/c/c23105673228c349739e958fa33955ed8faddcaf
https://git.kernel.org/stable/c/ff2a1a6f869650aec99e9d070b5ab625bfbc5bc3
https://git.kernel.org/stable/c/5ffc2a75534d9d74d49760f983f8eb675fa63d69
https://git.kernel.org/stable/c/7f445ca2e0e59c7971d0b7b853465e50844ab596
https://git.kernel.org/stable/c/1a3f8c6cd29d9078cc81b29d39d0e9ae1d6a03c3
https://git.kernel.org/stable/c/5450535901d89a5dcca5fbbc59a24fe89caeb465
https://git.kernel.org/stable/c/f268f6cf875f3220afc77bdd0bf1bb136eb54db9
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.303
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.270
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.337
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.159
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.83
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.227
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.13
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###