๐Ÿ” CVE Alert

CVE-2022-49889

MEDIUM 5.5

ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters() On some machines the number of listed CPUs may be bigger than the actual CPUs that exist. The tracing subsystem allocates a per_cpu directory with access to the per CPU ring buffer via a cpuX file. But to save space, the ring buffer will only allocate buffers for online CPUs, even though the CPU array will be as big as the nr_cpu_ids. With the addition of waking waiters on the ring buffer when closing the file, the ring_buffer_wake_waiters() now needs to make sure that the buffer is allocated (with the irq_work allocated with it) before trying to wake waiters, as it will cause a NULL pointer dereference. While debugging this, I added a NULL check for the buffer itself (which is OK to do), and also NULL pointer checks against buffer->buffers (which is not fine, and will WARN) as well as making sure the CPU number passed in is within the nr_cpu_ids (which is also not fine if it isn't). Bugzilla: https://bugzilla.opensuse.org/show_bug.cgi?id=1204705

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2475de2bc0de17fb1b24c5e90194f84b5ca70d3e < b5074df412bf3df9d6ce096b6fa03eb1082d05c9 f4f15344110d0b5b8822ac97bc8200e71939c945 < 49ca992f6e50d0f46ec9608f44e011cf3121f389 f3ddb74ad0790030c9592229fb14d8c451f4e9a8 < 7433632c9ff68a991bd0bc38cabf354e9d2de410 5544f411a4e8bc39e6a444badbac37dd0e0caf0a
Linux / Linux
5.15.75 < 5.15.78 6.0.3 < 6.0.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b5074df412bf3df9d6ce096b6fa03eb1082d05c9 git.kernel.org: https://git.kernel.org/stable/c/49ca992f6e50d0f46ec9608f44e011cf3121f389 git.kernel.org: https://git.kernel.org/stable/c/7433632c9ff68a991bd0bc38cabf354e9d2de410