CVE-2022-49152

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49152
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49152.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49152
Downstream
Published
2025-02-26T01:55:18Z
Modified
2025-10-21T08:57:16.962109Z
Summary
XArray: Fix xas_create_range() when multi-order entry present
Details

In the Linux kernel, the following vulnerability has been resolved:

XArray: Fix xascreaterange() when multi-order entry present

If there is already an entry present that is of order >= XACHUNKSHIFT when we call xascreaterange(), xascreaterange() will misinterpret that entry as a node and dereference xa_node->parent, generally leading to a crash that looks something like this:

general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 0 PID: 32 Comm: khugepaged Not tainted 5.17.0-rc8-syzkaller-00003-g56e337f2cf13 #0 RIP: 0010:xaparentlocked include/linux/xarray.h:1207 [inline] RIP: 0010:xascreaterange+0x2d9/0x6e0 lib/xarray.c:725

It's deterministically reproducable once you know what the problem is, but producing it in a live kernel requires khugepaged to hit a race. While the problem has been present since xascreaterange() was introduced, I'm not aware of a way to hit it before the page cache was converted to use multi-index entries.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3
Fixed
18f13edf3424b3b61814b69d5269b2e14584800c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3
Fixed
3e3c658055c002900982513e289398a1aad4a488

Affected versions

v5.*

v5.16
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.17.1

Database specific

vanir_signatures

[
    {
        "id": "CVE-2022-49152-1bb6b1d4",
        "signature_type": "Function",
        "digest": {
            "length": 912.0,
            "function_hash": "279580651357910770193350271706372840124"
        },
        "signature_version": "v1",
        "target": {
            "function": "check_create_range",
            "file": "lib/test_xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
        "deprecated": false
    },
    {
        "id": "CVE-2022-49152-201f4f59",
        "signature_type": "Function",
        "digest": {
            "length": 901.0,
            "function_hash": "168462413731251386788828017925001027626"
        },
        "signature_version": "v1",
        "target": {
            "function": "xas_create_range",
            "file": "lib/xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
        "deprecated": false
    },
    {
        "id": "CVE-2022-49152-416aef65",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "236673303370232155483406321399916443377",
                "302966042083978661609530475600328596886",
                "194941478556462271455606108017519218742",
                "127865027862046429326916198526544196764",
                "337834453572243824018765013483992273278",
                "263063904871549353171626482576552912513",
                "38233224495242408979650463536233543149"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "lib/test_xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
        "deprecated": false
    },
    {
        "id": "CVE-2022-49152-71ee8259",
        "signature_type": "Function",
        "digest": {
            "length": 901.0,
            "function_hash": "168462413731251386788828017925001027626"
        },
        "signature_version": "v1",
        "target": {
            "function": "xas_create_range",
            "file": "lib/xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
        "deprecated": false
    },
    {
        "id": "CVE-2022-49152-72670dc2",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "236673303370232155483406321399916443377",
                "302966042083978661609530475600328596886",
                "194941478556462271455606108017519218742",
                "127865027862046429326916198526544196764",
                "337834453572243824018765013483992273278",
                "263063904871549353171626482576552912513",
                "38233224495242408979650463536233543149"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "lib/test_xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
        "deprecated": false
    },
    {
        "id": "CVE-2022-49152-a7024f70",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "338020990777416942166546940713349574374",
                "286833840448209916202213219334795824304",
                "293580865110768879107887752964411041770",
                "120970443224700431308221753571526366595"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "lib/xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@18f13edf3424b3b61814b69d5269b2e14584800c",
        "deprecated": false
    },
    {
        "id": "CVE-2022-49152-da6f58d0",
        "signature_type": "Function",
        "digest": {
            "length": 912.0,
            "function_hash": "279580651357910770193350271706372840124"
        },
        "signature_version": "v1",
        "target": {
            "function": "check_create_range",
            "file": "lib/test_xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
        "deprecated": false
    },
    {
        "id": "CVE-2022-49152-e90bfc43",
        "signature_type": "Line",
        "digest": {
            "line_hashes": [
                "338020990777416942166546940713349574374",
                "286833840448209916202213219334795824304",
                "293580865110768879107887752964411041770",
                "120970443224700431308221753571526366595"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "lib/xarray.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3e3c658055c002900982513e289398a1aad4a488",
        "deprecated": false
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.17.0
Fixed
5.17.2