#VU92914 NULL pointer dereference in Linux kernel - CVE-2022-48751
Published: June 20, 2024 / Updated: May 13, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the smc_stat_fallback(), smc_switch_to_fallback(), smc_listen_decline(), smc_listen_work(), smc_sendmsg(), smc_setsockopt() and smc_getsockopt() functions in net/smc/af_smc.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/38f0bdd548fd2ef5d481b88d8a2bfef968452e34
- https://git.kernel.org/stable/c/4284225cd8001e134f5cf533a7cd244bbb654d0f
- https://git.kernel.org/stable/c/c0bf3d8a943b6f2e912b7c1de03e2ef28e76f760
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.19
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17