SB2024082228 - NULL pointer dereference in Linux kernel sched
Published: August 22, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2022-48921)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tg_nop(), sched_fork(), set_user_nice(), __setscheduler_params() and sched_init() functions in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/8f317cd888059c59e2fa924bf4b0957cfa53f78e
- https://git.kernel.org/stable/c/e0bcd6b5779352aed88f2e538a82a39f1a7715bb
- https://git.kernel.org/stable/c/589a954daab5e18399860b6c8ffaeaf79844eb20
- https://git.kernel.org/stable/c/13765de8148f71fa795e0a6607de37c49ea5915a
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.137
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.27
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.13
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17