CVE-2022-49321

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49321
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49321.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49321
Downstream
Related
Published
2025-02-26T02:10:46.186Z
Modified
2025-11-28T02:35:31.346558Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
xprtrdma: treat all calls not a bcall when bc_serv is NULL
Details

In the Linux kernel, the following vulnerability has been resolved:

xprtrdma: treat all calls not a bcall when bc_serv is NULL

When a rdma server returns a fault format reply, nfs v3 client may treats it as a bcall when bc service is not exist.

The debug message at rpcrdmabcreceive_call are,

[56579.837169] RPC: rpcrdmabcreceivecall: callback XID 00000001, length=20 [56579.837174] RPC: rpcrdmabcreceivecall: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04

After that, rpcrdmabcreceive_call will meets NULL pointer as,

[ 226.057890] BUG: unable to handle kernel NULL pointer dereference at 00000000000000c8 ... [ 226.058704] RIP: 0010:rawspinlock+0xc/0x20 ... [ 226.059732] Call Trace: [ 226.059878] rpcrdmabcreceivecall+0x138/0x327 [rpcrdma] [ 226.060011] _ibprocesscq+0x89/0x170 [ibcore] [ 226.060092] ibcqpollwork+0x26/0x80 [ibcore] [ 226.060257] processonework+0x1a7/0x360 [ 226.060367] ? createworker+0x1a0/0x1a0 [ 226.060440] workerthread+0x30/0x390 [ 226.060500] ? createworker+0x1a0/0x1a0 [ 226.060574] kthread+0x116/0x130 [ 226.060661] ? kthreadflushworkfn+0x10/0x10 [ 226.060724] retfromfork+0x35/0x40 ...

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49321.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
8e3943c50764dc7c5f25911970c3ff062ec1f18c
Fixed
998d35a2aff4b81a1c784f3aa45cd3afff6814c1
Fixed
da99331fa62131a38a0947a8204c5208de7b0454
Fixed
8dbae5affbdbf524b48000f9d357925bb001e5f4
Fixed
a3fc8051ee061e31db13e2fe011e8e0b71a7f815
Fixed
90c4f73104016748533a5707ecd15930fbeff402
Fixed
91784f3d77b73885e1b2e6b59d3cbf0de0a1126a
Fixed
11270e7ca268e8d61b5d9e5c3a54bd1550642c9c

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.14.283
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.247
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.198
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.122
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.47
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.17.15
Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
5.18.4