目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2022-49124— Linux kernel 安全漏洞

EPSS 0.01% · P3
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2022-49124 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
x86/mce: Work around an erratum on fast string copy instructions
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: x86/mce: Work around an erratum on fast string copy instructions A rare kernel panic scenario can happen when the following conditions are met due to an erratum on fast string copy instructions: 1) An uncorrected error. 2) That error must be in first cache line of a page. 3) Kernel must execute page_copy from the page immediately before that page. The fast string copy instructions ("REP; MOVS*") could consume an uncorrectable memory error in the cache line _right after_ the desired region to copy and raise an MCE. Bit 0 of MSR_IA32_MISC_ENABLE can be cleared to disable fast string copy and will avoid such spurious machine checks. However, that is less preferable due to the permanent performance impact. Considering memory poison is rare, it's desirable to keep fast string copy enabled until an MCE is seen. Intel has confirmed the following: 1. The CPU erratum of fast string copy only applies to Skylake, Cascade Lake and Cooper Lake generations. Directly return from the MCE handler: 2. Will result in complete execution of the "REP; MOVS*" with no data loss or corruption. 3. Will not result in another MCE firing on the next poisoned cache line due to "REP; MOVS*". 4. Will resume execution from a correct point in code. 5. Will result in the same instruction that triggered the MCE firing a second MCE immediately for any other software recoverable data fetch errors. 6. Is not safe without disabling the fast string copy, as the next fast string copy of the same buffer on the same CPU would result in a PANIC MCE. This should mitigate the erratum completely with the only caveat that the fast string copy is disabled on the affected hyper thread thus performance degradation. This is still better than the OS crashing on MCEs raised on an irrelevant process due to "REP; MOVS*' accesses in a kernel context, e.g., copy_page. Injected errors on 1st cache line of 8 anonymous pages of process 'proc1' and observed MCE consumption from 'proc2' with no panic (directly returned). Without the fix, the host panicked within a few minutes on a random 'proc2' process due to kernel access from copy_page. [ bp: Fix comment style + touch ups, zap an unlikely(), improve the quirk function's readability. ]
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于x86/mce中的快速字符串复制指令错误。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 27fbe5b28a2ffef171c6005f304ea4f80fcdcc01 ~ ba37c73be3d5632f6fb9fa20b250ce45560ca85d -
LinuxLinux 2.6.19 -

二、漏洞 CVE-2022-49124 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2022-49124 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2025-02-26 · 共 706 条

CVE-2022-49498Linux kernel 安全漏洞
CVE-2022-49486Linux kernel 安全漏洞
CVE-2022-49488Linux kernel 安全漏洞
CVE-2022-49489Linux kernel 安全漏洞
CVE-2022-49490Linux kernel 安全漏洞
CVE-2022-49491Linux kernel 安全漏洞
CVE-2022-49492Linux kernel 安全漏洞
CVE-2022-49493Linux kernel 安全漏洞
CVE-2022-49494Linux kernel 安全漏洞
CVE-2022-49495Linux kernel 安全漏洞
CVE-2022-49497Linux kernel 安全漏洞
CVE-2022-49496Linux kernel 安全漏洞
CVE-2022-49502Linux kernel 安全漏洞
CVE-2022-49507Linux kernel 安全漏洞
CVE-2022-49508Linux kernel 安全漏洞
CVE-2022-49506Linux kernel 安全漏洞
CVE-2022-49504Linux kernel 安全漏洞
CVE-2022-49505Linux kernel 安全漏洞
CVE-2022-49501Linux kernel 安全漏洞
CVE-2022-49500Linux kernel 安全漏洞

显示前 20 条,共 706 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-49124

暂无评论


发表评论