{
  "threat_severity" : "Moderate",
  "public_date" : "2025-06-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: mm/mprotect: only reference swap pfn page if type match",
    "id" : "2373483",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2373483"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.0",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-843",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nmm/mprotect: only reference swap pfn page if type match\nYu Zhao reported a bug after the commit \"mm/swap: Add swp_offset_pfn() to\nfetch PFN from swap entry\" added a check in swp_offset_pfn() for swap type [1]:\nkernel BUG at include/linux/swapops.h:117!\nCPU: 46 PID: 5245 Comm: EventManager_De Tainted: G S         O L 6.0.0-dbg-DEV #2\nRIP: 0010:pfn_swap_entry_to_page+0x72/0xf0\nCode: c6 48 8b 36 48 83 fe ff 74 53 48 01 d1 48 83 c1 08 48 8b 09 f6\nc1 01 75 7b 66 90 48 89 c1 48 8b 09 f6 c1 01 74 74 5d c3 eb 9e <0f> 0b\n48 ba ff ff ff ff 03 00 00 00 eb ae a9 ff 0f 00 00 75 13 48\nRSP: 0018:ffffa59e73fabb80 EFLAGS: 00010282\nRAX: 00000000ffffffe8 RBX: 0c00000000000000 RCX: ffffcd5440000000\nRDX: 1ffffffffff7a80a RSI: 0000000000000000 RDI: 0c0000000000042b\nRBP: ffffa59e73fabb80 R08: ffff9965ca6e8bb8 R09: 0000000000000000\nR10: ffffffffa5a2f62d R11: 0000030b372e9fff R12: ffff997b79db5738\nR13: 000000000000042b R14: 0c0000000000042b R15: 1ffffffffff7a80a\nFS:  00007f549d1bb700(0000) GS:ffff99d3cf680000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000440d035b3180 CR3: 0000002243176004 CR4: 00000000003706e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<TASK>\nchange_pte_range+0x36e/0x880\nchange_p4d_range+0x2e8/0x670\nchange_protection_range+0x14e/0x2c0\nmprotect_fixup+0x1ee/0x330\ndo_mprotect_pkey+0x34c/0x440\n__x64_sys_mprotect+0x1d/0x30\nIt triggers because pfn_swap_entry_to_page() could be called upon e.g. a\ngenuine swap entry.\nFix it by only calling it when it's a write migration entry where the page*\nis used.\n[1] https://lore.kernel.org/lkml/CAOUHufaVC2Za-p8m0aiHw6YkheDcrO-C3wRGixwDS32VTS+k1w@mail.gmail.com/" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-49992\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49992\nhttps://lore.kernel.org/linux-cve-announce/2025061825-CVE-2022-49992-c5f0@gregkh/T" ],
  "name" : "CVE-2022-49992",
  "csaw" : false
}