#VU94442 NULL pointer dereference in Linux kernel


Published: 2024-07-17

Vulnerability identifier: #VU94442

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-48795

CWE-ID: CWE-476

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the sba_unmap_sg() function in drivers/parisc/sba_iommu.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/f23f0444ead4d941165aa82ce2fcbb997dc00e97
http://git.kernel.org/stable/c/de75676ee99bf9f25b1124ff301b3f7b8ba597d4
http://git.kernel.org/stable/c/867e50231c7605547d9334904d70a181f39f2d9e
http://git.kernel.org/stable/c/efccc9b0c7e28d0eb7918a236e59f60dc23db4c3
http://git.kernel.org/stable/c/f8f519d7df66c334b5e08f896ac70ee3b53add3b
http://git.kernel.org/stable/c/8c8e949ae81e7f5ab58f9f9f8e9b573b93173dd2
http://git.kernel.org/stable/c/e40ae3133ed87d6d526f3c8fc6a5f9a2d72dcdbf
http://git.kernel.org/stable/c/b7d6f44a0fa716a82969725516dc0b16bc7cd514


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability