CVE-2022-49928
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
01/05/2025
Last modified:
01/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed<br />
<br />
There is a null-ptr-deref when xps sysfs alloc failed:<br />
BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0<br />
Read of size 8 at addr 0000000000000030 by task gssproxy/457<br />
<br />
CPU: 5 PID: 457 Comm: gssproxy Not tainted 6.0.0-09040-g02357b27ee03 #9<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x34/0x44<br />
kasan_report+0xa3/0x120<br />
sysfs_do_create_link_sd+0x40/0xd0<br />
rpc_sysfs_client_setup+0x161/0x1b0<br />
rpc_new_client+0x3fc/0x6e0<br />
rpc_create_xprt+0x71/0x220<br />
rpc_create+0x1d4/0x350<br />
gssp_rpc_create+0xc3/0x160<br />
set_gssp_clnt+0xbc/0x140<br />
write_gssp+0x116/0x1a0<br />
proc_reg_write+0xd6/0x130<br />
vfs_write+0x177/0x690<br />
ksys_write+0xb9/0x150<br />
do_syscall_64+0x35/0x80<br />
entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
<br />
When the xprt_switch sysfs alloc failed, should not add xprt and<br />
switch sysfs to it, otherwise, maybe null-ptr-deref; also initialize<br />
the &#39;xps_sysfs&#39; to NULL to avoid oops when destroy it.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.78 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



