SB2024082229 - NULL pointer dereference in Linux kernel riscv kernel
Published: August 22, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2022-48922)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the PT_STATUS() function in arch/riscv/kernel/entry.S, within the obj-$() function in arch/riscv/kernel/Makefile. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/9e2dbc31e367d08ee299a0d8aeb498cb2e12a1c3
- https://git.kernel.org/stable/c/1851b9a467065b18ec2cba156eea345206df1c8f
- https://git.kernel.org/stable/c/b5e180490db4af8c0f80c4b65ee482d333d0e8ee
- https://git.kernel.org/stable/c/22e2100b1b07d6f5acc71cc1acb53f680c677d77
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.103
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.26
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17