CVE-2022-50675
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of Memory Tagging Extension (MTE) on arm64 architectures. Specifically, the PG_mte_tagged bit was being set incorrectly on pages that were not tagged, such as those involved in swap or migration operations. This caused tags to be copied incorrectly between pages, leading to mismatches detected by KASAN (Kernel Address Sanitizer) when hardware tagging was enabled. The issue was fixed by moving the setting of the PG_mte_tagged bit to the correct functions that clear or restore tags, preventing improper tag propagation.
How can this vulnerability impact me? :
This vulnerability can cause incorrect memory tagging in the kernel, leading to false positives or actual faults detected by KASAN when accessing memory. This can result in system instability or crashes due to invalid memory accesses, especially on systems using hardware memory tagging for security and debugging.