Vulnerability Details CVE-2022-49916
In the Linux kernel, the following vulnerability has been resolved:
rose: Fix NULL pointer dereference in rose_send_frame()
The syzkaller reported an issue:
KASAN: null-ptr-deref in range [0x0000000000000380-0x0000000000000387]
CPU: 0 PID: 4069 Comm: kworker/0:15 Not tainted 6.0.0-syzkaller-02734-g0326074ff465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Workqueue: rcu_gp srcu_invoke_callbacks
RIP: 0010:rose_send_frame+0x1dd/0x2f0 net/rose/rose_link.c:101
Call Trace:
<IRQ>
rose_transmit_clear_request+0x1d5/0x290 net/rose/rose_link.c:255
rose_rx_call_request+0x4c0/0x1bc0 net/rose/af_rose.c:1009
rose_loopback_timer+0x19e/0x590 net/rose/rose_loopback.c:111
call_timer_fn+0x1a0/0x6b0 kernel/time/timer.c:1474
expire_timers kernel/time/timer.c:1519 [inline]
__run_timers.part.0+0x674/0xa80 kernel/time/timer.c:1790
__run_timers kernel/time/timer.c:1768 [inline]
run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1803
__do_softirq+0x1d0/0x9c8 kernel/softirq.c:571
[...]
</IRQ>
It triggers NULL pointer dereference when 'neigh->dev->dev_addr' is
called in the rose_send_frame(). It's the first occurrence of the
`neigh` is in rose_loopback_timer() as `rose_loopback_neigh', and
the 'dev' in 'rose_loopback_neigh' is initialized sa nullptr.
It had been fixed by commit 3b3fd068c56e3fbea30090859216a368398e39bf
("rose: Fix Null pointer dereference in rose_send_frame()") ever.
But it's introduced by commit 3c53cd65dece47dd1f9d3a809f32e59d1d87b2b8
("rose: check NULL rose_loopback_neigh->loopback") again.
We fix it by add NULL check in rose_transmit_clear_request(). When
the 'dev' in 'neigh' is NULL, we don't reply the request and just
clear it.
syzkaller don't provide repro, and I provide a syz repro like:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201})
r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
bind$rose(r1, &(0x7f00000000c0)=@full={0xb, @dev, @null, 0x0, [@null, @null, @netrom, @netrom, @default, @null]}, 0x40)
connect$rose(r1, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c)
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 1.4%
CVSS Severity
CVSS v3 Score 5.5
Products affected by CVE-2022-49916
-
cpe:2.3:o:linux:linux_kernel:4.14.292
-
cpe:2.3:o:linux:linux_kernel:4.14.293
-
cpe:2.3:o:linux:linux_kernel:4.14.294
-
cpe:2.3:o:linux:linux_kernel:4.14.295
-
cpe:2.3:o:linux:linux_kernel:4.14.296
-
cpe:2.3:o:linux:linux_kernel:4.14.297
-
cpe:2.3:o:linux:linux_kernel:4.14.298
-
cpe:2.3:o:linux:linux_kernel:4.19.257
-
cpe:2.3:o:linux:linux_kernel:4.19.258
-
cpe:2.3:o:linux:linux_kernel:4.19.259
-
cpe:2.3:o:linux:linux_kernel:4.19.260
-
cpe:2.3:o:linux:linux_kernel:4.19.261
-
cpe:2.3:o:linux:linux_kernel:4.19.262
-
cpe:2.3:o:linux:linux_kernel:4.19.263
-
cpe:2.3:o:linux:linux_kernel:4.19.264
-
cpe:2.3:o:linux:linux_kernel:4.9.327
-
cpe:2.3:o:linux:linux_kernel:4.9.328
-
cpe:2.3:o:linux:linux_kernel:4.9.329
-
cpe:2.3:o:linux:linux_kernel:4.9.330
-
cpe:2.3:o:linux:linux_kernel:4.9.331
-
cpe:2.3:o:linux:linux_kernel:4.9.332
-
cpe:2.3:o:linux:linux_kernel:5.10.140
-
cpe:2.3:o:linux:linux_kernel:5.10.141
-
cpe:2.3:o:linux:linux_kernel:5.10.142
-
cpe:2.3:o:linux:linux_kernel:5.10.143
-
cpe:2.3:o:linux:linux_kernel:5.10.144
-
cpe:2.3:o:linux:linux_kernel:5.10.145
-
cpe:2.3:o:linux:linux_kernel:5.10.146
-
cpe:2.3:o:linux:linux_kernel:5.10.147
-
cpe:2.3:o:linux:linux_kernel:5.10.148
-
cpe:2.3:o:linux:linux_kernel:5.10.149
-
cpe:2.3:o:linux:linux_kernel:5.10.150
-
cpe:2.3:o:linux:linux_kernel:5.10.151
-
cpe:2.3:o:linux:linux_kernel:5.10.152
-
cpe:2.3:o:linux:linux_kernel:5.10.153
-
cpe:2.3:o:linux:linux_kernel:5.15.64
-
cpe:2.3:o:linux:linux_kernel:5.15.65
-
cpe:2.3:o:linux:linux_kernel:5.15.66
-
cpe:2.3:o:linux:linux_kernel:5.15.67
-
cpe:2.3:o:linux:linux_kernel:5.15.68
-
cpe:2.3:o:linux:linux_kernel:5.15.69
-
cpe:2.3:o:linux:linux_kernel:5.15.70
-
cpe:2.3:o:linux:linux_kernel:5.15.71
-
cpe:2.3:o:linux:linux_kernel:5.15.72
-
cpe:2.3:o:linux:linux_kernel:5.15.73
-
cpe:2.3:o:linux:linux_kernel:5.15.74
-
cpe:2.3:o:linux:linux_kernel:5.15.75
-
cpe:2.3:o:linux:linux_kernel:5.15.76
-
cpe:2.3:o:linux:linux_kernel:5.15.77
-
cpe:2.3:o:linux:linux_kernel:5.19.10
-
cpe:2.3:o:linux:linux_kernel:5.19.11
-
cpe:2.3:o:linux:linux_kernel:5.19.12
-
cpe:2.3:o:linux:linux_kernel:5.19.13
-
cpe:2.3:o:linux:linux_kernel:5.19.14
-
cpe:2.3:o:linux:linux_kernel:5.19.15
-
cpe:2.3:o:linux:linux_kernel:5.19.16
-
cpe:2.3:o:linux:linux_kernel:5.19.17
-
cpe:2.3:o:linux:linux_kernel:5.19.6
-
cpe:2.3:o:linux:linux_kernel:5.19.7
-
cpe:2.3:o:linux:linux_kernel:5.19.8
-
cpe:2.3:o:linux:linux_kernel:5.19.9
-
cpe:2.3:o:linux:linux_kernel:5.4.212
-
cpe:2.3:o:linux:linux_kernel:5.4.213
-
cpe:2.3:o:linux:linux_kernel:5.4.214
-
cpe:2.3:o:linux:linux_kernel:5.4.215
-
cpe:2.3:o:linux:linux_kernel:5.4.216
-
cpe:2.3:o:linux:linux_kernel:5.4.217
-
cpe:2.3:o:linux:linux_kernel:5.4.218
-
cpe:2.3:o:linux:linux_kernel:5.4.219
-
cpe:2.3:o:linux:linux_kernel:5.4.220
-
cpe:2.3:o:linux:linux_kernel:5.4.221
-
cpe:2.3:o:linux:linux_kernel:5.4.222
-
cpe:2.3:o:linux:linux_kernel:5.4.223
-
cpe:2.3:o:linux:linux_kernel:6.0
-
cpe:2.3:o:linux:linux_kernel:6.0.1
-
cpe:2.3:o:linux:linux_kernel:6.0.2
-
cpe:2.3:o:linux:linux_kernel:6.0.3
-
cpe:2.3:o:linux:linux_kernel:6.0.4
-
cpe:2.3:o:linux:linux_kernel:6.0.5
-
cpe:2.3:o:linux:linux_kernel:6.0.6
-
cpe:2.3:o:linux:linux_kernel:6.0.7
-
cpe:2.3:o:linux:linux_kernel:6.1