Executive Summary

Informations
Name CVE-2022-49065 First vendor Publication 2025-02-26
Vendor Cve Last vendor Modification 2025-03-18

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix the svc_deferred_event trace class

Fix a NULL deref crash that occurs when an svc_rqst is deferred while the sunrpc tracing subsystem is enabled. svc_revisit() sets dr->xprt to NULL, so it can't be relied upon in the tracepoint to provide the remote's address.

Unfortunately we can't revert the "svc_deferred_class" hunk in commit ece200ddd54b ("sunrpc: Save remote presentation address in svc_xprt for trace events") because there is now a specific check of event format specifiers for unsafe dereferences. The warning that check emits is:

event svc_defer_recv has unsafe dereference of argument 1

A "%pISpc" format specifier with a "struct sockaddr *" is indeed flagged by this check.

Instead, take the brute-force approach used by the svcrdma_qp_error tracepoint. Convert the dr::addr field into a presentation address in the TP_fast_assign() arm of the trace event, and store that as a string. This fix can be backported to -stable kernels.

In the meantime, commit c6ced22997ad ("tracing: Update print fmt check to handle new __get_sockaddr() macro") is now in v5.18, so this wonky fix can be replaced with __sockaddr() and friends properly during the v5.19 merge window.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49065

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3530

Sources (Detail)

https://git.kernel.org/stable/c/4d5004451ab2218eab94a30e1841462c9316ba19
https://git.kernel.org/stable/c/726ae7300fcc25fefa46d188cc07eb16dc908f9e
https://git.kernel.org/stable/c/85ee17ca21cf92989e8c923e3ea4514c291e9d38
https://git.kernel.org/stable/c/c2456f470eea3bd06574d988bf6089e7c3f4c5cc
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2025-06-26 02:09:11
  • Multiple Updates
2025-06-25 12:22:01
  • Multiple Updates
2025-06-24 02:13:47
  • Multiple Updates
2025-05-27 02:09:22
  • Multiple Updates
2025-03-29 03:14:09
  • Multiple Updates
2025-03-28 13:34:35
  • Multiple Updates
2025-03-28 02:56:40
  • Multiple Updates
2025-03-18 21:21:17
  • Multiple Updates
2025-02-26 17:20:34
  • First insertion