Home

Description

In the Linux kernel, the following vulnerability has been resolved: mm/uffd: fix warning without PTE_MARKER_UFFD_WP compiled in When PTE_MARKER_UFFD_WP not configured, it's still possible to reach pte marker code and trigger an warning. Add a few CONFIG_PTE_MARKER_UFFD_WP ifdefs to make sure the code won't be reached when not compiled in.

PUBLISHED Reserved 2025-09-17 | Published 2025-10-01 | Updated 2025-10-01 | Assigner Linux

Product status

Default status
unaffected

b1f9e876862d8f7176299ec4fb2108bc1045cbc8 before b76e4eb02e9edb9a0a51942acdb373ca01346e8c
affected

b1f9e876862d8f7176299ec4fb2108bc1045cbc8 before 2204a880cb0c51952463a24a4fa01a6514c5a25a
affected

b1f9e876862d8f7176299ec4fb2108bc1045cbc8 before 515778e2d790652a38a24554fdb7f21420d91efc
affected

Default status
affected

5.19
affected

Any version before 5.19
unaffected

5.19.17
unaffected

6.0.3
unaffected

6.1
unaffected

References

git.kernel.org/...c/b76e4eb02e9edb9a0a51942acdb373ca01346e8c

git.kernel.org/...c/2204a880cb0c51952463a24a4fa01a6514c5a25a

git.kernel.org/...c/515778e2d790652a38a24554fdb7f21420d91efc

cve.org (CVE-2022-50448)

nvd.nist.gov (CVE-2022-50448)

Download JSON