CVE-2022-49090

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49090
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49090.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49090
Downstream
Related
Published
2025-02-26T01:54:46Z
Modified
2025-10-21T09:09:10.655154Z
Summary
arch/arm64: Fix topology initialization for core scheduling
Details

In the Linux kernel, the following vulnerability has been resolved:

arch/arm64: Fix topology initialization for core scheduling

Arm64 systems rely on storecputopology() to call updatesiblingsmasks() to transfer the toplogy to the various cpu masks. This needs to be done before the call to notifycpustarting() which tells the scheduler about each cpu found, otherwise the core scheduling data structures are setup in a way that does not match the actual topology.

With smt_mask not setup correctly we bail on cpumask_weight(smt_mask) == 1 for !leaders in:

notifycpustarting() cpuhpinvokecallbackrange() schedcpustarting() schedcorecpustarting()

which leads to rq->core not being correctly set for !leader-rq's.

Without this change stress-ng (which enables core scheduling in its prctl tests in newer versions -- i.e. with PRSCHEDCORE support) causes a warning and then a crash (trimmed for legibility):

[ 1853.805168] ------------[ cut here ]------------ [ 1853.809784] taskrq(b)->core != rq->core [ 1853.809792] WARNING: CPU: 117 PID: 0 at kernel/sched/fair.c:11102 cfsprioless+0x1b4/0x1c4 ... [ 1854.015210] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010 ... [ 1854.231256] Call trace: [ 1854.233689] picknexttask+0x3dc/0x81c [ 1854.237512] _schedule+0x10c/0x4cc [ 1854.240988] schedule_idle+0x34/0x54

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9edeaea1bc452372718837ed2ba775811baf1ba1
Fixed
87f5d66daa5f457449bb95d6b8d18bb7596aa627
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9edeaea1bc452372718837ed2ba775811baf1ba1
Fixed
790c1567582bda8f1153015436e3330a7c6eb278
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9edeaea1bc452372718837ed2ba775811baf1ba1
Fixed
c78a1b2d0bff678570c8dc9f14035606f5e5257d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9edeaea1bc452372718837ed2ba775811baf1ba1
Fixed
5524cbb1bfcdff0cad0aaa9f94e6092002a07259

Affected versions

v5.*

v5.13
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.4
v5.15.5
v5.15.6
v5.15.7
v5.15.8
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.16.1
v5.16.10
v5.16.11
v5.16.12
v5.16.13
v5.16.14
v5.16.15
v5.16.16
v5.16.17
v5.16.18
v5.16.19
v5.16.2
v5.16.3
v5.16.4
v5.16.5
v5.16.6
v5.16.7
v5.16.8
v5.16.9
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.17.1
v5.17.2
v5.18-rc1

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@87f5d66daa5f457449bb95d6b8d18bb7596aa627",
        "target": {
            "file": "arch/arm64/kernel/smp.c"
        },
        "deprecated": false,
        "id": "CVE-2022-49090-14b3a817",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "314665774878996223119502333543412541268",
                "221624292204327809209293008534162368109",
                "260694920189527089170140996437077535837",
                "45787014565530967879835976581675617236",
                "283201495880720876527970972546066891911",
                "2928077740570602533365312529832686740",
                "103610464644513962192437041291939126775"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@790c1567582bda8f1153015436e3330a7c6eb278",
        "target": {
            "file": "arch/arm64/kernel/smp.c"
        },
        "deprecated": false,
        "id": "CVE-2022-49090-cf7f9a4d",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "314665774878996223119502333543412541268",
                "221624292204327809209293008534162368109",
                "260694920189527089170140996437077535837",
                "45787014565530967879835976581675617236",
                "283201495880720876527970972546066891911",
                "2928077740570602533365312529832686740",
                "103610464644513962192437041291939126775"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c78a1b2d0bff678570c8dc9f14035606f5e5257d",
        "target": {
            "file": "arch/arm64/kernel/smp.c"
        },
        "deprecated": false,
        "id": "CVE-2022-49090-d45d5def",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "314665774878996223119502333543412541268",
                "221624292204327809209293008534162368109",
                "260694920189527089170140996437077535837",
                "45787014565530967879835976581675617236",
                "283201495880720876527970972546066891911",
                "2928077740570602533365312529832686740",
                "103610464644513962192437041291939126775"
            ]
        }
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5524cbb1bfcdff0cad0aaa9f94e6092002a07259",
        "target": {
            "file": "arch/arm64/kernel/smp.c"
        },
        "deprecated": false,
        "id": "CVE-2022-49090-e491beb0",
        "signature_version": "v1",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "314665774878996223119502333543412541268",
                "221624292204327809209293008534162368109",
                "260694920189527089170140996437077535837",
                "45787014565530967879835976581675617236",
                "283201495880720876527970972546066891911",
                "2928077740570602533365312529832686740",
                "103610464644513962192437041291939126775"
            ]
        }
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.34
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.20
Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.3