NULL Pointer Dereference Affecting kernel-core package, versions <0:5.14.0-70.117.1.el9_0
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL9-KERNELCORE-8081817
- published 24 Sep 2024
- disclosed 16 Jul 2024
Introduced: 16 Jul 2024
CVE-2022-48816 Open this link in a new tabHow to fix?
Upgrade RHEL:9
kernel-core
to version 0:5.14.0-70.117.1.el9_0 or higher.
This issue was patched in RHSA-2024:6991
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-core
package and not the kernel-core
package as distributed by RHEL
.
See How to fix?
for RHEL:9
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: lock against ->sock changing during sysfs read
->sock can be set to NULL asynchronously unless ->recv_mutex is held. So it is important to hold that mutex. Otherwise a sysfs read can trigger an oops. Commit 17f09d3f619a ("SUNRPC: Check if the xprt is connected before handling sysfs reads") appears to attempt to fix this problem, but it only narrows the race window.