NULL pointer dereference in Linux kernel rose



| Updated: 2025-05-10
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-49904
CWE-ID CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU108266

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49904

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the rose_transmit_clear_request() function in net/rose/rose_link.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.14 - 6.1 rc7

CPE2.3 External links

https://git.kernel.org/stable/c/0d38b4ca6679e72860ff8730e79bb99d0e9fa3b0
https://git.kernel.org/stable/c/1c89642e7f2b7ecc9635610653f5c2f0276c0051
https://git.kernel.org/stable/c/2b45d6d0c41cb9593868e476681efb1aae5078a1
https://git.kernel.org/stable/c/a99a8ec4c62180c889482a2ff6465033e0743458
https://git.kernel.org/stable/c/b49f6b2f21f543d4dc88fb7b1ec2adccb822f27c
https://git.kernel.org/stable/c/b736592de2aa53aee2d48d6b129bc0c892007bbe
https://git.kernel.org/stable/c/f8017317cb0b279b8ab98b0f3901a2e0ac880dad
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.299
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.265
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.154
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.78
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.224
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.8
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###