We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49889

ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters()



Description

In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() On some machines the number of listed CPUs may be bigger than the actual CPUs that exist. The tracing subsystem allocates a per_cpu directory with access to the per CPU ring buffer via a cpuX file. But to save space, the ring buffer will only allocate buffers for online CPUs, even though the CPU array will be as big as the nr_cpu_ids. With the addition of waking waiters on the ring buffer when closing the file, the ring_buffer_wake_waiters() now needs to make sure that the buffer is allocated (with the irq_work allocated with it) before trying to wake waiters, as it will cause a NULL pointer dereference. While debugging this, I added a NULL check for the buffer itself (which is OK to do), and also NULL pointer checks against buffer->buffers (which is not fine, and will WARN) as well as making sure the CPU number passed in is within the nr_cpu_ids (which is also not fine if it isn't). Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=1204705

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

2475de2bc0de17fb1b24c5e90194f84b5ca70d3e before b5074df412bf3df9d6ce096b6fa03eb1082d05c9
affected

f4f15344110d0b5b8822ac97bc8200e71939c945 before 49ca992f6e50d0f46ec9608f44e011cf3121f389
affected

f3ddb74ad0790030c9592229fb14d8c451f4e9a8 before 7433632c9ff68a991bd0bc38cabf354e9d2de410
affected

5544f411a4e8bc39e6a444badbac37dd0e0caf0a
affected

Default status
unaffected

5.15.75 before 5.15.78
affected

6.0.3 before 6.0.8
affected

References

git.kernel.org/...c/b5074df412bf3df9d6ce096b6fa03eb1082d05c9

git.kernel.org/...c/49ca992f6e50d0f46ec9608f44e011cf3121f389

git.kernel.org/...c/7433632c9ff68a991bd0bc38cabf354e9d2de410

cve.org (CVE-2022-49889)

nvd.nist.gov (CVE-2022-49889)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49889

Support options

Helpdesk Chat, Email, Knowledgebase