- Description
- In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing memory_section->usage") changed pfn_section_valid() to add a READ_ONCE() call around "ms->usage" to fix a race with section_deactivate() where ms->usage can be cleared. The READ_ONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- nvd@nist.gov
- CWE-476
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "138634FF-1840-4C45-8CDE-6174B6F50352",
"versionEndExcluding": "5.10.222",
"versionStartIncluding": "5.10.219"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0720413E-F29A-4C0A-9B57-5158A778C4A2",
"versionEndExcluding": "5.15.163",
"versionStartIncluding": "5.15.149"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6BFB68AD-DB7E-4C4C-B598-274D83D12C4B",
"versionEndExcluding": "6.1.100",
"versionStartIncluding": "6.1.76"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9D8E9231-015C-48A6-BBDD-9DCEA3145858",
"versionEndExcluding": "6.6.41",
"versionStartIncluding": "6.6.15"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6FAC1A24-181A-4DB7-801D-4BDF1B4E4116",
"versionEndExcluding": "6.9.10",
"versionStartIncluding": "6.8"
}
],
"operator": "OR"
}
]
}
]