NULL pointer dereference in Linux kernel parisc driver



Published: 2024-07-17
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-48795
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU94442

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48795

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sba_unmap_sg() function in drivers/parisc/sba_iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions

External links

http://git.kernel.org/stable/c/f23f0444ead4d941165aa82ce2fcbb997dc00e97
http://git.kernel.org/stable/c/de75676ee99bf9f25b1124ff301b3f7b8ba597d4
http://git.kernel.org/stable/c/867e50231c7605547d9334904d70a181f39f2d9e
http://git.kernel.org/stable/c/efccc9b0c7e28d0eb7918a236e59f60dc23db4c3
http://git.kernel.org/stable/c/f8f519d7df66c334b5e08f896ac70ee3b53add3b
http://git.kernel.org/stable/c/8c8e949ae81e7f5ab58f9f9f8e9b573b93173dd2
http://git.kernel.org/stable/c/e40ae3133ed87d6d526f3c8fc6a5f9a2d72dcdbf
http://git.kernel.org/stable/c/b7d6f44a0fa716a82969725516dc0b16bc7cd514


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###