In the Linux kernel, the following vulnerability has been resolved:
sched: Fix yet more sched_fork() races
Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an
invalid sched_task_group") fixed a fork race vs cgroup, it opened up a
race vs syscalls by not placing the task on the runqueue before it
gets exposed through the pidhash.
Commit 13765de8148f ("sched/fair: Fix fault in reweight_entity") is
trying to fix a single instance of this, instead fix the whole class
of issues, effectively reverting this commit.
References
Configurations
Configuration 1 (hide)
|
History
03 Sep 2024, 14:26
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/3411613611a5cddf7e80908010dc87cb527dd13b - Patch | |
References | () https://git.kernel.org/stable/c/b1e8206582f9d680cff7d04828708c8b6ab32957 - Patch | |
References | () https://git.kernel.org/stable/c/c65cfd89cef669d90c59f3bf150af6458137a04f - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
30 Aug 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-30 11:15
Updated : 2024-09-03 14:26
NVD link : CVE-2022-48944
Mitre link : CVE-2022-48944
CVE.ORG link : CVE-2022-48944
JSON object : View
Products Affected
linux
- linux_kernel
CWE