First published: Wed Jul 07 2021(Updated: )
A flaw use after free found in Linux Kernel mm/mremap memory address space accounting source code. If race condition happens between rmap walk and mremap, this can result in stale TLB entries. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:4.18.0-425.13.1.rt7.223.el8_7 | 0:4.18.0-425.13.1.rt7.223.el8_7 |
redhat/kernel | <0:4.18.0-425.13.1.el8_7 | 0:4.18.0-425.13.1.el8_7 |
redhat/kernel | <0:4.18.0-372.46.1.el8_6 | 0:4.18.0-372.46.1.el8_6 |
Google Android | ||
Linux Kernel | >=5.0<5.4.211 | |
Linux Kernel | >=5.5<5.10.137 | |
Linux Kernel | >=5.11<5.12.18 | |
Linux Kernel | >=5.13<5.13.3 | |
Debian Debian Linux | =10.0 | |
netapp hci baseboard management controller | =h300s | |
netapp hci baseboard management controller | =h410c | |
netapp hci baseboard management controller | =h410s | |
netapp hci baseboard management controller | =h500s | |
netapp hci baseboard management controller | =h700s | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
Ubuntu Linux | =22.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-41222 has been assigned a medium severity rating due to its potential impact on memory management in the Linux Kernel.
To fix CVE-2022-41222, update the Linux Kernel to the recommended versions or later: 0:4.18.0-425.13.1.rt7.223.el8_7, 0:4.18.0-425.13.1.el8_7, or other specified versions.
CVE-2022-41222 affects various distributions, including certain versions of Red Hat, Ubuntu, and Debian based on the Linux Kernel.
Systems running the affected versions of the Linux Kernel, including servers and desktop environments, are at risk from CVE-2022-41222.
There are no recommended workarounds for CVE-2022-41222; the best action is to apply the available patches.