In the Linux kernel, the following vulnerability has been resolved:
perf: Fix list corruption in perfcgroupswitch()
There's list corruption on cgrpcpuctxlist. This happens on the following path:
perfcgroupswitch: listforeachentry(cgrpcpuctxlist) cpuctxschedin ctxschedin ctxpinnedschedin mergeschedin perfcgroupeventdisable: remove the event from the list
Use listforeachentrysafe() to allow removing an entry during iteration.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "length": 665.0, "function_hash": "300192234831417225112368368282079160917" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5f4e5ce638e6a490b976ade4a40017b40abb2da0", "deprecated": false, "target": { "file": "kernel/events/core.c", "function": "perf_cgroup_switch" }, "signature_type": "Function", "id": "CVE-2022-48799-0e6c9d84" }, { "signature_version": "v1", "digest": { "length": 665.0, "function_hash": "300192234831417225112368368282079160917" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2142bc1469a316fddd10012d76428f7265258f81", "deprecated": false, "target": { "file": "kernel/events/core.c", "function": "perf_cgroup_switch" }, "signature_type": "Function", "id": "CVE-2022-48799-15cc6396" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "72180453250091256912192060935042617740", "47023207472575123256175535768456097593", "319879350776116842586660644539712467935", "300478510844217002510604935266784386494", "154600324920867431147525418330298460748", "233405062677970170748629560920457433507", "222959791911611103697964327268438823524", "35898503588712503864261180725573685074" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5f4e5ce638e6a490b976ade4a40017b40abb2da0", "deprecated": false, "target": { "file": "kernel/events/core.c" }, "signature_type": "Line", "id": "CVE-2022-48799-45a816df" }, { "signature_version": "v1", "digest": { "length": 665.0, "function_hash": "300192234831417225112368368282079160917" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727", "deprecated": false, "target": { "file": "kernel/events/core.c", "function": "perf_cgroup_switch" }, "signature_type": "Function", "id": "CVE-2022-48799-487db899" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "72180453250091256912192060935042617740", "47023207472575123256175535768456097593", "319879350776116842586660644539712467935", "300478510844217002510604935266784386494", "154600324920867431147525418330298460748", "233405062677970170748629560920457433507", "222959791911611103697964327268438823524", "35898503588712503864261180725573685074" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2ed7b29d0673ba361546e2d87dbbed149456c45", "deprecated": false, "target": { "file": "kernel/events/core.c" }, "signature_type": "Line", "id": "CVE-2022-48799-4ee7423b" }, { "signature_version": "v1", "digest": { "length": 665.0, "function_hash": "300192234831417225112368368282079160917" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7969fe91c9830e045901970e9d755b7505881d4a", "deprecated": false, "target": { "file": "kernel/events/core.c", "function": "perf_cgroup_switch" }, "signature_type": "Function", "id": "CVE-2022-48799-67d566f5" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "72180453250091256912192060935042617740", "47023207472575123256175535768456097593", "319879350776116842586660644539712467935", "300478510844217002510604935266784386494", "154600324920867431147525418330298460748", "233405062677970170748629560920457433507", "222959791911611103697964327268438823524", "35898503588712503864261180725573685074" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2142bc1469a316fddd10012d76428f7265258f81", "deprecated": false, "target": { "file": "kernel/events/core.c" }, "signature_type": "Line", "id": "CVE-2022-48799-6991519b" }, { "signature_version": "v1", "digest": { "length": 665.0, "function_hash": "300192234831417225112368368282079160917" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d76ed4223403f90421782adb2f20a9ecbc93186", "deprecated": false, "target": { "file": "kernel/events/core.c", "function": "perf_cgroup_switch" }, "signature_type": "Function", "id": "CVE-2022-48799-8363a590" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "72180453250091256912192060935042617740", "47023207472575123256175535768456097593", "319879350776116842586660644539712467935", "300478510844217002510604935266784386494", "154600324920867431147525418330298460748", "233405062677970170748629560920457433507", "222959791911611103697964327268438823524", "35898503588712503864261180725573685074" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d76ed4223403f90421782adb2f20a9ecbc93186", "deprecated": false, "target": { "file": "kernel/events/core.c" }, "signature_type": "Line", "id": "CVE-2022-48799-b09f3a23" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "72180453250091256912192060935042617740", "47023207472575123256175535768456097593", "319879350776116842586660644539712467935", "300478510844217002510604935266784386494", "154600324920867431147525418330298460748", "233405062677970170748629560920457433507", "222959791911611103697964327268438823524", "35898503588712503864261180725573685074" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727", "deprecated": false, "target": { "file": "kernel/events/core.c" }, "signature_type": "Line", "id": "CVE-2022-48799-c0976b5f" }, { "signature_version": "v1", "digest": { "length": 665.0, "function_hash": "300192234831417225112368368282079160917" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2ed7b29d0673ba361546e2d87dbbed149456c45", "deprecated": false, "target": { "file": "kernel/events/core.c", "function": "perf_cgroup_switch" }, "signature_type": "Function", "id": "CVE-2022-48799-d2cebb5e" }, { "signature_version": "v1", "digest": { "length": 665.0, "function_hash": "300192234831417225112368368282079160917" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f6b5d51976fcefef5732da3e3feb3ccff680f7c8", "deprecated": false, "target": { "file": "kernel/events/core.c", "function": "perf_cgroup_switch" }, "signature_type": "Function", "id": "CVE-2022-48799-eed2c15a" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "72180453250091256912192060935042617740", "47023207472575123256175535768456097593", "319879350776116842586660644539712467935", "300478510844217002510604935266784386494", "154600324920867431147525418330298460748", "233405062677970170748629560920457433507", "222959791911611103697964327268438823524", "35898503588712503864261180725573685074" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f6b5d51976fcefef5732da3e3feb3ccff680f7c8", "deprecated": false, "target": { "file": "kernel/events/core.c" }, "signature_type": "Line", "id": "CVE-2022-48799-fa65b548" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "72180453250091256912192060935042617740", "47023207472575123256175535768456097593", "319879350776116842586660644539712467935", "300478510844217002510604935266784386494", "154600324920867431147525418330298460748", "233405062677970170748629560920457433507", "222959791911611103697964327268438823524", "35898503588712503864261180725573685074" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7969fe91c9830e045901970e9d755b7505881d4a", "deprecated": false, "target": { "file": "kernel/events/core.c" }, "signature_type": "Line", "id": "CVE-2022-48799-fb3197f6" } ] }