CVE-2022-48640
Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bonding: fix NULL deref in bond_rr_gen_slave_id<br />
<br />
Fix a NULL dereference of the struct bonding.rr_tx_counter member because<br />
if a bond is initially created with an initial mode != zero (Round Robin)<br />
the memory required for the counter is never created and when the mode is<br />
changed there is never any attempt to verify the memory is allocated upon<br />
switching modes.<br />
<br />
This causes the following Oops on an aarch64 machine:<br />
[ 334.686773] Unable to handle kernel paging request at virtual address ffff2c91ac905000<br />
[ 334.694703] Mem abort info:<br />
[ 334.697486] ESR = 0x0000000096000004<br />
[ 334.701234] EC = 0x25: DABT (current EL), IL = 32 bits<br />
[ 334.706536] SET = 0, FnV = 0<br />
[ 334.709579] EA = 0, S1PTW = 0<br />
[ 334.712719] FSC = 0x04: level 0 translation fault<br />
[ 334.717586] Data abort info:<br />
[ 334.720454] ISV = 0, ISS = 0x00000004<br />
[ 334.724288] CM = 0, WnR = 0<br />
[ 334.727244] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008044d662000<br />
[ 334.733944] [ffff2c91ac905000] pgd=0000000000000000, p4d=0000000000000000<br />
[ 334.740734] Internal error: Oops: 96000004 [#1] SMP<br />
[ 334.745602] Modules linked in: bonding tls veth rfkill sunrpc arm_spe_pmu vfat fat acpi_ipmi ipmi_ssif ixgbe igb i40e mdio ipmi_devintf ipmi_msghandler arm_cmn arm_dsu_pmu cppc_cpufreq acpi_tad fuse zram crct10dif_ce ast ghash_ce sbsa_gwdt nvme drm_vram_helper drm_ttm_helper nvme_core ttm xgene_hwmon<br />
[ 334.772217] CPU: 7 PID: 2214 Comm: ping Not tainted 6.0.0-rc4-00133-g64ae13ed4784 #4<br />
[ 334.779950] Hardware name: GIGABYTE R272-P31-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021<br />
[ 334.789244] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
[ 334.796196] pc : bond_rr_gen_slave_id+0x40/0x124 [bonding]<br />
[ 334.801691] lr : bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]<br />
[ 334.807962] sp : ffff8000221733e0<br />
[ 334.811265] x29: ffff8000221733e0 x28: ffffdbac8572d198 x27: ffff80002217357c<br />
[ 334.818392] x26: 000000000000002a x25: ffffdbacb33ee000 x24: ffff07ff980fa000<br />
[ 334.825519] x23: ffffdbacb2e398ba x22: ffff07ff98102000 x21: ffff07ff981029c0<br />
[ 334.832646] x20: 0000000000000001 x19: ffff07ff981029c0 x18: 0000000000000014<br />
[ 334.839773] x17: 0000000000000000 x16: ffffdbacb1004364 x15: 0000aaaabe2f5a62<br />
[ 334.846899] x14: ffff07ff8e55d968 x13: ffff07ff8e55db30 x12: 0000000000000000<br />
[ 334.854026] x11: ffffdbacb21532e8 x10: 0000000000000001 x9 : ffffdbac857178ec<br />
[ 334.861153] x8 : ffff07ff9f6e5a28 x7 : 0000000000000000 x6 : 000000007c2b3742<br />
[ 334.868279] x5 : ffff2c91ac905000 x4 : ffff2c91ac905000 x3 : ffff07ff9f554400<br />
[ 334.875406] x2 : ffff2c91ac905000 x1 : 0000000000000001 x0 : ffff07ff981029c0<br />
[ 334.882532] Call trace:<br />
[ 334.884967] bond_rr_gen_slave_id+0x40/0x124 [bonding]<br />
[ 334.890109] bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]<br />
[ 334.896033] __bond_start_xmit+0x128/0x3a0 [bonding]<br />
[ 334.901001] bond_start_xmit+0x54/0xb0 [bonding]<br />
[ 334.905622] dev_hard_start_xmit+0xb4/0x220<br />
[ 334.909798] __dev_queue_xmit+0x1a0/0x720<br />
[ 334.913799] arp_xmit+0x3c/0xbc<br />
[ 334.916932] arp_send_dst+0x98/0xd0<br />
[ 334.920410] arp_solicit+0xe8/0x230<br />
[ 334.923888] neigh_probe+0x60/0xb0<br />
[ 334.927279] __neigh_event_send+0x3b0/0x470<br />
[ 334.931453] neigh_resolve_output+0x70/0x90<br />
[ 334.935626] ip_finish_output2+0x158/0x514<br />
[ 334.939714] __ip_finish_output+0xac/0x1a4<br />
[ 334.943800] ip_finish_output+0x40/0xfc<br />
[ 334.947626] ip_output+0xf8/0x1a4<br />
[ 334.950931] ip_send_skb+0x5c/0x100<br />
[ 334.954410] ip_push_pending_frames+0x3c/0x60<br />
[ 334.958758] raw_sendmsg+0x458/0x6d0<br />
[ 334.962325] inet_sendmsg+0x50/0x80<br />
[ 334.965805] sock_sendmsg+0x60/0x6c<br />
[ 334.969286] __sys_sendto+0xc8/0x134<br />
[ 334.972853] __arm64_sys_sendto+0x34/0x4c<br />
---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025