CVE-2022-50257
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's xen/gntdev component involves improper handling of grant mapping operations. When a grant mapping operation partially fails, some entries become invalid while others remain valid, causing incorrect tracking of live grants. This leads to grant references being leaked because the system either fails to unmap successfully mapped pages or incorrectly adjusts the count of live grants, potentially resulting in negative counts and resource leaks. The issue manifests as warning messages in affected systems, such as Qubes OS, especially during rapid GUI window resizing.
How can this vulnerability impact me? :
The vulnerability can cause grant references to leak, meaning that memory pages granted to other domains may not be properly unmapped or released. This can lead to resource leaks, potential memory exhaustion, and instability in systems relying on Xen's grant mechanism, such as Qubes OS. It may also cause warning messages and unexpected behavior during operations like rapid GUI window resizing.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests in the Linux kernel with warning messages such as 'g.e. 0x1234 still pending' printed by the kernel in the VM that had granted pages to dom0, especially after rapid GUI VM window resizing. Detection involves monitoring kernel logs for these warning messages. Specific commands to check kernel logs include 'dmesg | grep "g.e."' or 'journalctl -k | grep "g.e."'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the patch that fixes the grant mapping counting logic in the Linux kernel's xen/gntdev component. This patch correctly counts successful map_ops and kmap_ops mappings separately and adjusts live_grants accordingly, preventing grant reference leaks. Until patched, avoid operations that cause rapid resizing or frequent grant mapping failures in paravirtualized domains to reduce the risk of triggering the issue.