We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49885

ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init()



Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init() Change num_ghes from int to unsigned int, preventing an overflow and causing subsequent vmalloc() to fail. The overflow happens in ghes_estatus_pool_init() when calculating len during execution of the statement below as both multiplication operands here are signed int: len += (num_ghes * GHES_ESOURCE_PREALLOC_MAX_SIZE); The following call trace is observed because of this bug: [ 9.317108] swapper/0: vmalloc error: size 18446744071562596352, exceeds total pages, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 9.317131] Call Trace: [ 9.317134] <TASK> [ 9.317137] dump_stack_lvl+0x49/0x5f [ 9.317145] dump_stack+0x10/0x12 [ 9.317146] warn_alloc.cold+0x7b/0xdf [ 9.317150] ? __device_attach+0x16a/0x1b0 [ 9.317155] __vmalloc_node_range+0x702/0x740 [ 9.317160] ? device_add+0x17f/0x920 [ 9.317164] ? dev_set_name+0x53/0x70 [ 9.317166] ? platform_device_add+0xf9/0x240 [ 9.317168] __vmalloc_node+0x49/0x50 [ 9.317170] ? ghes_estatus_pool_init+0x43/0xa0 [ 9.317176] vmalloc+0x21/0x30 [ 9.317177] ghes_estatus_pool_init+0x43/0xa0 [ 9.317179] acpi_hest_init+0x129/0x19c [ 9.317185] acpi_init+0x434/0x4a4 [ 9.317188] ? acpi_sleep_proc_init+0x2a/0x2a [ 9.317190] do_one_initcall+0x48/0x200 [ 9.317195] kernel_init_freeable+0x221/0x284 [ 9.317200] ? rest_init+0xe0/0xe0 [ 9.317204] kernel_init+0x1a/0x130 [ 9.317205] ret_from_fork+0x22/0x30 [ 9.317208] </TASK> [ rjw: Subject and changelog edits ]

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-06-19 | Assigner Linux

Product status

Default status
unaffected

fb7be08f1a091ec243780bfdad4bf0c492057808 before 9edf20e5a1d805855e78f241cf221d741b50d482
affected

fb7be08f1a091ec243780bfdad4bf0c492057808 before c50ec15725e005e9fb20bce69b6c23b135a4a9b7
affected

fb7be08f1a091ec243780bfdad4bf0c492057808 before 4c10c854113720cbfe75d4f51db79b700a629e73
affected

fb7be08f1a091ec243780bfdad4bf0c492057808 before 43d2748394c3feb86c0c771466f5847e274fc043
affected

Default status
affected

5.1
affected

Any version before 5.1
unaffected

5.10.154
unaffected

5.15.78
unaffected

6.0.8
unaffected

6.1
unaffected

References

git.kernel.org/...c/9edf20e5a1d805855e78f241cf221d741b50d482

git.kernel.org/...c/c50ec15725e005e9fb20bce69b6c23b135a4a9b7

git.kernel.org/...c/4c10c854113720cbfe75d4f51db79b700a629e73

git.kernel.org/...c/43d2748394c3feb86c0c771466f5847e274fc043

cve.org (CVE-2022-49885)

nvd.nist.gov (CVE-2022-49885)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49885

Support options

Helpdesk Chat, Email, Knowledgebase