CVE-2022-50657 PUBLISHED

In the Linux kernel, the following vulnerability has been resolved: riscv: mm: add missing memcpy in kasan_init Hi Atish, It seems that the panic is due to the missing memcpy during kasan_init. Could you please check whether this patch is helpful? When doing kasan_populate, the new allocated base_pud/base_p4d should contain kasan_early_shadow_{pud, p4d}'s content. Add the missing memcpy to avoid page fault when read/write kasan shadow region. Tested on: - qemu with sv57 and CONFIG_KASAN on. - qemu with sv48 and CONFIG_KASAN on.

EPSS 0.03% · 7.6th percentile

Risk Scores

EPSS Score
0.03%
7.6th percentile

Affected Products

VendorProductVersions
LinuxLinux8fbdccd2b17335e1881a23865e98c63fcc345938, 8fbdccd2b17335e1881a23865e98c63fcc345938, 5.18
linuxlinux_kernel5.18, 5.18

Timeline

References

Open in Interactive Console →