๐Ÿ” CVE Alert

CVE-2022-49321

MEDIUM 5.5

xprtrdma: treat all calls not a bcall when bc_serv is NULL

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: xprtrdma: treat all calls not a bcall when bc_serv is NULL When a rdma server returns a fault format reply, nfs v3 client may treats it as a bcall when bc service is not exist. The debug message at rpcrdma_bc_receive_call are, [56579.837169] RPC: rpcrdma_bc_receive_call: callback XID 00000001, length=20 [56579.837174] RPC: rpcrdma_bc_receive_call: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 After that, rpcrdma_bc_receive_call will meets NULL pointer as, [ 226.057890] BUG: unable to handle kernel NULL pointer dereference at 00000000000000c8 ... [ 226.058704] RIP: 0010:_raw_spin_lock+0xc/0x20 ... [ 226.059732] Call Trace: [ 226.059878] rpcrdma_bc_receive_call+0x138/0x327 [rpcrdma] [ 226.060011] __ib_process_cq+0x89/0x170 [ib_core] [ 226.060092] ib_cq_poll_work+0x26/0x80 [ib_core] [ 226.060257] process_one_work+0x1a7/0x360 [ 226.060367] ? create_worker+0x1a0/0x1a0 [ 226.060440] worker_thread+0x30/0x390 [ 226.060500] ? create_worker+0x1a0/0x1a0 [ 226.060574] kthread+0x116/0x130 [ 226.060661] ? kthread_flush_work_fn+0x10/0x10 [ 226.060724] ret_from_fork+0x35/0x40 ...

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
63cae47005af51c937f4cdcc4835f29075add2ba < 8e3943c50764dc7c5f25911970c3ff062ec1f18c 63cae47005af51c937f4cdcc4835f29075add2ba < 998d35a2aff4b81a1c784f3aa45cd3afff6814c1 63cae47005af51c937f4cdcc4835f29075add2ba < da99331fa62131a38a0947a8204c5208de7b0454 63cae47005af51c937f4cdcc4835f29075add2ba < 8dbae5affbdbf524b48000f9d357925bb001e5f4 63cae47005af51c937f4cdcc4835f29075add2ba < a3fc8051ee061e31db13e2fe011e8e0b71a7f815 63cae47005af51c937f4cdcc4835f29075add2ba < 90c4f73104016748533a5707ecd15930fbeff402 63cae47005af51c937f4cdcc4835f29075add2ba < 91784f3d77b73885e1b2e6b59d3cbf0de0a1126a 63cae47005af51c937f4cdcc4835f29075add2ba < 11270e7ca268e8d61b5d9e5c3a54bd1550642c9c
Linux / Linux
4.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8e3943c50764dc7c5f25911970c3ff062ec1f18c git.kernel.org: https://git.kernel.org/stable/c/998d35a2aff4b81a1c784f3aa45cd3afff6814c1 git.kernel.org: https://git.kernel.org/stable/c/da99331fa62131a38a0947a8204c5208de7b0454 git.kernel.org: https://git.kernel.org/stable/c/8dbae5affbdbf524b48000f9d357925bb001e5f4 git.kernel.org: https://git.kernel.org/stable/c/a3fc8051ee061e31db13e2fe011e8e0b71a7f815 git.kernel.org: https://git.kernel.org/stable/c/90c4f73104016748533a5707ecd15930fbeff402 git.kernel.org: https://git.kernel.org/stable/c/91784f3d77b73885e1b2e6b59d3cbf0de0a1126a git.kernel.org: https://git.kernel.org/stable/c/11270e7ca268e8d61b5d9e5c3a54bd1550642c9c