Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-48921— sched/fair: Fix fault in reweight_entity

EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-48921

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
sched/fair: Fix fault in reweight_entity
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix fault in reweight_entity Syzbot found a GPF in reweight_entity. This has been bisected to commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid sched_task_group") There is a race between sched_post_fork() and setpriority(PRIO_PGRP) within a thread group that causes a null-ptr-deref in reweight_entity() in CFS. The scenario is that the main process spawns number of new threads, which then call setpriority(PRIO_PGRP, 0, -20), wait, and exit. For each of the new threads the copy_process() gets invoked, which adds the new task_struct and calls sched_post_fork() for it. In the above scenario there is a possibility that setpriority(PRIO_PGRP) and set_one_prio() will be called for a thread in the group that is just being created by copy_process(), and for which the sched_post_fork() has not been executed yet. This will trigger a null pointer dereference in reweight_entity(), as it will try to access the run queue pointer, which hasn't been set. Before the mentioned change the cfs_rq pointer for the task has been set in sched_fork(), which is called much earlier in copy_process(), before the new task is added to the thread_group. Now it is done in the sched_post_fork(), which is called after that. To fix the issue the remove the update_load param from the update_load param() function and call reweight_task() only if the task flag doesn't have the TASK_NEW flag set.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于在reweight_entity函数中存在竞争条件问题,导致在新线程调用setpriority函数时发生空指针取消引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux c85c6fadbef0a3eab41540ea628fa8fe8928c820 ~ 8f317cd888059c59e2fa924bf4b0957cfa53f78e -
LinuxLinux 5.16 -

II. Public POCs for CVE-2022-48921

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-48921

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-08-22 · 42 CVEs total

CVE-2022-48931configfs: fix a race in configfs_{,un}register_subsystem()
CVE-2022-48923btrfs: prevent copying too big compressed lzo segment
CVE-2022-48924thermal: int340x: fix memory leak in int3400_notify()
CVE-2022-48925RDMA/cma: Do not change route.addr.src_addr outside state checks
CVE-2022-48942hwmon: Handle failure to register sensor with thermal zone correctly
CVE-2022-48943KVM: x86/mmu: make apf token non-zero to fix bug
CVE-2022-48926usb: gadget: rndis: add spinlock for rndis response list
CVE-2022-48927iio: adc: tsc2046: fix memory corruption by preventing array overflow
CVE-2022-48928iio: adc: men_z188_adc: Fix a resource leak in an error handling path
CVE-2022-48929bpf: Fix crash due to out of bounds access into reg2btf_ids.
CVE-2022-48930RDMA/ib_srp: Fix a deadlock
CVE-2022-48922riscv: fix oops caused by irqsoff latency tracer
CVE-2022-48932net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte
CVE-2022-48933netfilter: nf_tables: fix memory leak during stateful obj update
CVE-2022-48934nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
CVE-2022-48935netfilter: nf_tables: unregister flowtable hooks on netns exit
CVE-2022-48937io_uring: add a schedule point in io_add_buffers()
CVE-2022-48938CDC-NCM: avoid overflow in sanity checking
CVE-2022-48939bpf: Add schedule points in batch ops
CVE-2022-48940bpf: Fix crash due to incorrect copy_map_value

Showing top 20 of 42 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-48921

No comments yet


Leave a comment