Home

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: mm: add missing memcpy in kasan_init Hi Atish, It seems that the panic is due to the missing memcpy during kasan_init. Could you please check whether this patch is helpful? When doing kasan_populate, the new allocated base_pud/base_p4d should contain kasan_early_shadow_{pud, p4d}'s content. Add the missing memcpy to avoid page fault when read/write kasan shadow region. Tested on: - qemu with sv57 and CONFIG_KASAN on. - qemu with sv48 and CONFIG_KASAN on.

PUBLISHED Reserved 2025-12-09 | Published 2025-12-09 | Updated 2025-12-09 | Assigner Linux

Product status

Default status
unaffected

8fbdccd2b17335e1881a23865e98c63fcc345938 (git) before ff0f6becf3a6f817838b6f80a2c9cca43dce0576
affected

8fbdccd2b17335e1881a23865e98c63fcc345938 (git) before 9f2ac64d6ca60db99132e08628ac2899f956a0ec
affected

Default status
affected

5.18
affected

Any version before 5.18
unaffected

6.0.7 (semver)
unaffected

6.1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ff0f6becf3a6f817838b6f80a2c9cca43dce0576

git.kernel.org/...c/9f2ac64d6ca60db99132e08628ac2899f956a0ec

cve.org (CVE-2022-50657)

nvd.nist.gov (CVE-2022-50657)

Download JSON