Executive Summary

Informations
Name CVE-2022-48921 First vendor Publication 2024-08-22
Vendor Cve Last vendor Modification 2024-09-12

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 4.7
Base Score 4.7 Environmental Score 4.7
impact SubScore 3.6 Temporal Score 4.7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix fault in reweight_entity

Syzbot found a GPF in reweight_entity. This has been bisected to commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid sched_task_group")

There is a race between sched_post_fork() and setpriority(PRIO_PGRP) within a thread group that causes a null-ptr-deref in reweight_entity() in CFS. The scenario is that the main process spawns number of new threads, which then call setpriority(PRIO_PGRP, 0, -20), wait, and exit. For each of the new threads the copy_process() gets invoked, which adds the new task_struct and calls sched_post_fork() for it.

In the above scenario there is a possibility that setpriority(PRIO_PGRP) and set_one_prio() will be called for a thread in the group that is just being created by copy_process(), and for which the sched_post_fork() has not been executed yet. This will trigger a null pointer dereference in reweight_entity(), as it will try to access the run queue pointer, which hasn't been set.

Before the mentioned change the cfs_rq pointer for the task has been set in sched_fork(), which is called much earlier in copy_process(), before the new task is added to the thread_group. Now it is done in the sched_post_fork(), which is called after that. To fix the issue the remove the update_load param from the update_load param() function and call reweight_task() only if the task flag doesn't have the TASK_NEW flag set.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48921

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-362 Race Condition

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3507

Sources (Detail)

https://git.kernel.org/stable/c/13765de8148f71fa795e0a6607de37c49ea5915a
https://git.kernel.org/stable/c/589a954daab5e18399860b6c8ffaeaf79844eb20
https://git.kernel.org/stable/c/8f317cd888059c59e2fa924bf4b0957cfa53f78e
https://git.kernel.org/stable/c/e0bcd6b5779352aed88f2e538a82a39f1a7715bb
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Date Informations
2025-01-08 02:47:30
  • Multiple Updates
2025-01-07 02:47:06
  • Multiple Updates
2024-12-25 02:45:53
  • Multiple Updates
2024-12-12 02:48:47
  • Multiple Updates
2024-11-22 02:46:12
  • Multiple Updates
2024-11-20 02:43:36
  • Multiple Updates
2024-11-14 02:43:28
  • Multiple Updates
2024-11-09 02:44:07
  • Multiple Updates
2024-10-26 02:41:52
  • Multiple Updates
2024-10-25 02:43:38
  • Multiple Updates
2024-10-23 02:43:02
  • Multiple Updates
2024-10-03 02:39:06
  • Multiple Updates
2024-10-02 02:37:29
  • Multiple Updates
2024-09-12 17:27:46
  • Multiple Updates
2024-08-23 02:48:13
  • Multiple Updates
2024-08-23 02:34:45
  • Multiple Updates
2024-08-22 17:27:24
  • Multiple Updates
2024-08-22 09:27:25
  • First insertion