Bug 1227953 (CVE-2022-48799) - VUL-0: CVE-2022-48799: kernel: perf: fix list corruption in perf_cgroup_switch()
Summary: VUL-0: CVE-2022-48799: kernel: perf: fix list corruption in perf_cgroup_switch()
Status: NEW
Alias: CVE-2022-48799
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: CVE kernel patch monkeys
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/414200/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-48799:4.4:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-16 14:36 UTC by SMASH SMASH
Modified: 2024-07-17 17:54 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-16 14:36:20 UTC
In the Linux kernel, the following vulnerability has been resolved:

perf: Fix list corruption in perf_cgroup_switch()

There's list corruption on cgrp_cpuctx_list. This happens on the
following path:

  perf_cgroup_switch: list_for_each_entry(cgrp_cpuctx_list)
      cpu_ctx_sched_in
         ctx_sched_in
            ctx_pinned_sched_in
              merge_sched_in
                  perf_cgroup_event_disable: remove the event from the list

Use list_for_each_entry_safe() to allow removing an entry during
iteration.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48799
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2022/CVE-2022-48799.mbox
https://git.kernel.org/stable/c/5d76ed4223403f90421782adb2f20a9ecbc93186
https://git.kernel.org/stable/c/30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727
https://git.kernel.org/stable/c/a2ed7b29d0673ba361546e2d87dbbed149456c45
https://git.kernel.org/stable/c/f6b5d51976fcefef5732da3e3feb3ccff680f7c8
https://git.kernel.org/stable/c/7969fe91c9830e045901970e9d755b7505881d4a
https://git.kernel.org/stable/c/2142bc1469a316fddd10012d76428f7265258f81
https://git.kernel.org/stable/c/5f4e5ce638e6a490b976ade4a40017b40abb2da0
https://www.cve.org/CVERecord?id=CVE-2022-48799