CVE-2022-48922

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
22/08/2024
Last modified:
12/09/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv: fix oops caused by irqsoff latency tracer<br /> <br /> The trace_hardirqs_{on,off}() require the caller to setup frame pointer<br /> properly. This because these two functions use macro &amp;#39;CALLER_ADDR1&amp;#39; (aka.<br /> __builtin_return_address(1)) to acquire caller info. If the $fp is used<br /> for other purpose, the code generated this macro (as below) could trigger<br /> memory access fault.<br /> <br /> 0xffffffff8011510e : ld a1,-16(s0)<br /> 0xffffffff80115112 : ld s2,-8(a1) #

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.9 (including) 5.10.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.26 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.12 (excluding)
cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*