In the Linux kernel, the following vulnerability has been resolved:
RDMA/hfi1: Prevent panic when SDMA is disabled
If the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to
hfi1_write_iter() will dereference a NULL pointer and panic. A typical
stack frame is:
sdma_select_user_engine [hfi1]
hfi1_user_sdma_process_request [hfi1]
hfi1_write_iter [hfi1]
do_iter_readv_writev
do_iter_write
vfs_writev
do_writev
do_syscall_64
The fix is to test for SDMA in hfi1_write_iter() and fail the I/O with
EINVAL.
References
Configurations
Configuration 1 (hide)
|
History
22 Oct 2025, 17:27
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/0e4dda8b3f4c07ee9ea670a10ea3171a5e63a86f - Patch | |
References | () https://git.kernel.org/stable/c/22e7e400fd1a890db2ea13686324aff50e972f4f - Patch | |
References | () https://git.kernel.org/stable/c/29952ab85d6c3fe0b7909d9a737f10c58bf6824d - Patch | |
References | () https://git.kernel.org/stable/c/32e6aea33944f364d51cd263e4cd236393a188b6 - Patch | |
References | () https://git.kernel.org/stable/c/33794e8e9bcb4affc0ebff9cdec85acc8b8a1762 - Patch | |
References | () https://git.kernel.org/stable/c/629e052d0c98e46dde9f0824f0aa437f678d9b8f - Patch | |
References | () https://git.kernel.org/stable/c/cc80d3c37cec9d6ddb140483647901bc7cc6c31d - Patch | |
References | () https://git.kernel.org/stable/c/e60ad83f645ee6fadd5a8057ba267aeec54f08fe - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-10-22 17:27
NVD link : CVE-2022-49429
Mitre link : CVE-2022-49429
CVE.ORG link : CVE-2022-49429
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference