CVE-2022-49010
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/10/2024
Last modified:
24/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
hwmon: (coretemp) Check for null before removing sysfs attrs<br />
<br />
If coretemp_add_core() gets an error then pdata->core_data[indx]<br />
is already NULL and has been kfreed. Don&#39;t pass that to<br />
sysfs_remove_group() as that will crash in sysfs_remove_group().<br />
<br />
[Shortened for readability]<br />
[91854.020159] sysfs: cannot create duplicate filename &#39;/devices/platform/coretemp.0/hwmon/hwmon2/temp20_label&#39;<br />
<br />
[91855.126115] BUG: kernel NULL pointer dereference, address: 0000000000000188<br />
[91855.165103] #PF: supervisor read access in kernel mode<br />
[91855.194506] #PF: error_code(0x0000) - not-present page<br />
[91855.224445] PGD 0 P4D 0<br />
[91855.238508] Oops: 0000 [#1] PREEMPT SMP PTI<br />
...<br />
[91855.342716] RIP: 0010:sysfs_remove_group+0xc/0x80<br />
...<br />
[91855.796571] Call Trace:<br />
[91855.810524] coretemp_cpu_offline+0x12b/0x1dd [coretemp]<br />
[91855.841738] ? coretemp_cpu_online+0x180/0x180 [coretemp]<br />
[91855.871107] cpuhp_invoke_callback+0x105/0x4b0<br />
[91855.893432] cpuhp_thread_fun+0x8e/0x150<br />
...<br />
<br />
Fix this by checking for NULL first.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.0 (including) | 4.9.335 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.301 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.268 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.226 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.158 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.82 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/070d5ea4a0592a37ad96ce7f7b6b024f90bb009f
- https://git.kernel.org/stable/c/280110db1a7d62ad635b103bafc3ae96e8bef75c
- https://git.kernel.org/stable/c/7692700ac818866d138a8de555130a6e70e6ac16
- https://git.kernel.org/stable/c/89eecabe6a47403237f45aafd7d24f93cb973653
- https://git.kernel.org/stable/c/a89ff5f5cc64b9fe7a992cf56988fd36f56ca82a
- https://git.kernel.org/stable/c/ae6c8b6e5d5628df1c475c0a8fca1465e205c95b
- https://git.kernel.org/stable/c/f06e0cd01eab954bd5f2190c9faa79bb5357e05b
- https://git.kernel.org/stable/c/fb503d077ff7b43913503eaf72995d1239028b99



