CVE-2022-49928: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed There is a null-ptr-deref when xps sysfs alloc failed: BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0 Read of size 8 at addr 0000000000000030 by task gssproxy/457 CPU: 5 PID: 457 Comm: gssproxy Not tainted 6.0.0-09040-g02357b27ee03 #9 Call Trace: <TASK> dump_stack_lvl+0x34/0x44 kasan_report+0xa3/0x120 sysfs_do_create_link_sd+0x40/0xd0 rpc_sysfs_client_setup+0x161/0x1b0 rpc_new_client+0x3fc/0x6e0 rpc_create_xprt+0x71/0x220 rpc_create+0x1d4/0x350 gssp_rpc_create+0xc3/0x160 set_gssp_clnt+0xbc/0x140 write_gssp+0x116/0x1a0 proc_reg_write+0xd6/0x130 vfs_write+0x177/0x690 ksys_write+0xb9/0x150 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 When the xprt_switch sysfs alloc failed, should not add xprt and switch sysfs to it, otherwise, maybe null-ptr-deref; also initialize the 'xps_sysfs' to NULL to avoid oops when destroy it.
AI Analysis
Technical Summary
CVE-2022-49928 is a vulnerability identified in the Linux kernel related to the SUNRPC subsystem, specifically involving a null pointer dereference (null-ptr-deref) triggered when the xps sysfs allocation fails. The vulnerability arises during the creation of sysfs links for transport (xprt) switches in the RPC client setup process. When the allocation of the xprt_switch sysfs entry fails, the kernel code incorrectly attempts to add the xprt and switch sysfs entries without verifying the allocation success, leading to a null pointer dereference. This causes a kernel oops or crash, as evidenced by the KASAN (Kernel Address Sanitizer) report showing a read of size 8 at a null address. The issue occurs in the function sysfs_do_create_link_sd and propagates through rpc_sysfs_client_setup and rpc_new_client calls, ultimately affecting the gssproxy process. The root cause is the lack of proper error handling and initialization of the xps_sysfs pointer to NULL, which should prevent dereferencing invalid pointers during cleanup or destruction. This vulnerability can lead to denial of service (DoS) by crashing the kernel or causing instability. The affected versions are specific Linux kernel commits identified by their hashes, and the vulnerability was published on May 1, 2025. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments running affected Linux kernel versions, especially those utilizing SUNRPC services such as NFS or other RPC-based services. A successful exploitation could cause kernel crashes leading to denial of service, impacting availability of critical systems including servers, network appliances, and infrastructure components. This could disrupt business operations, particularly in sectors relying heavily on Linux-based infrastructure such as finance, telecommunications, government, and cloud service providers. Although no remote code execution or privilege escalation is indicated, the DoS impact could be leveraged as part of a broader attack chain or to cause operational disruption. The lack of known exploits reduces immediate risk, but the vulnerability’s presence in kernel-level code means that any exploitation would have system-wide effects. European organizations with large-scale Linux deployments or those using RPC heavily should prioritize patching to maintain service continuity and system stability.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2022-49928 as soon as they are available and tested in your environment. Since the vulnerability is in the kernel, updating to a fixed kernel version is the most effective mitigation. 2. For environments where immediate patching is not feasible, consider disabling or restricting SUNRPC services if they are not essential, to reduce the attack surface. 3. Implement kernel crash monitoring and alerting to detect and respond quickly to any kernel oops or crashes potentially related to this vulnerability. 4. Conduct thorough testing of kernel updates in staging environments to ensure compatibility and stability before production deployment. 5. Maintain strict access controls and monitoring on systems running RPC services to detect abnormal usage patterns or attempts to trigger the vulnerability. 6. Engage with Linux distribution vendors for backported patches if using long-term support kernels or enterprise distributions. 7. Document and review system configurations to ensure sysfs and RPC subsystems are not exposed unnecessarily, limiting potential exploitation vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-49928: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed There is a null-ptr-deref when xps sysfs alloc failed: BUG: KASAN: null-ptr-deref in sysfs_do_create_link_sd+0x40/0xd0 Read of size 8 at addr 0000000000000030 by task gssproxy/457 CPU: 5 PID: 457 Comm: gssproxy Not tainted 6.0.0-09040-g02357b27ee03 #9 Call Trace: <TASK> dump_stack_lvl+0x34/0x44 kasan_report+0xa3/0x120 sysfs_do_create_link_sd+0x40/0xd0 rpc_sysfs_client_setup+0x161/0x1b0 rpc_new_client+0x3fc/0x6e0 rpc_create_xprt+0x71/0x220 rpc_create+0x1d4/0x350 gssp_rpc_create+0xc3/0x160 set_gssp_clnt+0xbc/0x140 write_gssp+0x116/0x1a0 proc_reg_write+0xd6/0x130 vfs_write+0x177/0x690 ksys_write+0xb9/0x150 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 When the xprt_switch sysfs alloc failed, should not add xprt and switch sysfs to it, otherwise, maybe null-ptr-deref; also initialize the 'xps_sysfs' to NULL to avoid oops when destroy it.
AI-Powered Analysis
Technical Analysis
CVE-2022-49928 is a vulnerability identified in the Linux kernel related to the SUNRPC subsystem, specifically involving a null pointer dereference (null-ptr-deref) triggered when the xps sysfs allocation fails. The vulnerability arises during the creation of sysfs links for transport (xprt) switches in the RPC client setup process. When the allocation of the xprt_switch sysfs entry fails, the kernel code incorrectly attempts to add the xprt and switch sysfs entries without verifying the allocation success, leading to a null pointer dereference. This causes a kernel oops or crash, as evidenced by the KASAN (Kernel Address Sanitizer) report showing a read of size 8 at a null address. The issue occurs in the function sysfs_do_create_link_sd and propagates through rpc_sysfs_client_setup and rpc_new_client calls, ultimately affecting the gssproxy process. The root cause is the lack of proper error handling and initialization of the xps_sysfs pointer to NULL, which should prevent dereferencing invalid pointers during cleanup or destruction. This vulnerability can lead to denial of service (DoS) by crashing the kernel or causing instability. The affected versions are specific Linux kernel commits identified by their hashes, and the vulnerability was published on May 1, 2025. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily in environments running affected Linux kernel versions, especially those utilizing SUNRPC services such as NFS or other RPC-based services. A successful exploitation could cause kernel crashes leading to denial of service, impacting availability of critical systems including servers, network appliances, and infrastructure components. This could disrupt business operations, particularly in sectors relying heavily on Linux-based infrastructure such as finance, telecommunications, government, and cloud service providers. Although no remote code execution or privilege escalation is indicated, the DoS impact could be leveraged as part of a broader attack chain or to cause operational disruption. The lack of known exploits reduces immediate risk, but the vulnerability’s presence in kernel-level code means that any exploitation would have system-wide effects. European organizations with large-scale Linux deployments or those using RPC heavily should prioritize patching to maintain service continuity and system stability.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2022-49928 as soon as they are available and tested in your environment. Since the vulnerability is in the kernel, updating to a fixed kernel version is the most effective mitigation. 2. For environments where immediate patching is not feasible, consider disabling or restricting SUNRPC services if they are not essential, to reduce the attack surface. 3. Implement kernel crash monitoring and alerting to detect and respond quickly to any kernel oops or crashes potentially related to this vulnerability. 4. Conduct thorough testing of kernel updates in staging environments to ensure compatibility and stability before production deployment. 5. Maintain strict access controls and monitoring on systems running RPC services to detect abnormal usage patterns or attempts to trigger the vulnerability. 6. Engage with Linux distribution vendors for backported patches if using long-term support kernels or enterprise distributions. 7. Document and review system configurations to ensure sysfs and RPC subsystems are not exposed unnecessarily, limiting potential exploitation vectors.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-05-01T14:05:17.253Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe408e
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 8:42:44 PM
Last updated: 7/31/2025, 12:47:21 PM
Views: 14
Related Threats
CVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54458: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.