CVE-2022-50285
15.09.2025, 15:15
In the Linux kernel, the following vulnerability has been resolved: mm,hugetlb: take hugetlb_lock before decrementing h->resv_huge_pages The h->*_huge_pages counters are protected by the hugetlb_lock, but alloc_huge_page has a corner case where it can decrement the counter outside of the lock. This could lead to a corrupted value of h->resv_huge_pages, which we have observed on our systems. Take the hugetlb_lock before decrementing h->resv_huge_pages to avoid a potential race.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.3.6 ≤ 𝑥 < 4.4 |
| linux | linux_kernel | 4.4.1 ≤ 𝑥 < 4.9.332 |
| linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.298 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.264 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.223 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.153 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.76 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.0.6 |
| linux | linux_kernel | 4.4 |
| linux | linux_kernel | 4.4:rc5 |
| linux | linux_kernel | 4.4:rc6 |
| linux | linux_kernel | 4.4:rc7 |
| linux | linux_kernel | 4.4:rc8 |
| linux | linux_kernel | 6.1:rc1 |
𝑥
= Vulnerable software versions
Debian Releases
References