CVE-2022-49429

In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Prevent panic when SDMA is disabled If the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to hfi1_write_iter() will dereference a NULL pointer and panic. A typical stack frame is: sdma_select_user_engine [hfi1] hfi1_user_sdma_process_request [hfi1] hfi1_write_iter [hfi1] do_iter_readv_writev do_iter_write vfs_writev do_writev do_syscall_64 The fix is to test for SDMA in hfi1_write_iter() and fail the I/O with EINVAL.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 17:27

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hfi1: Evitar pánico cuando SDMA está deshabilitado Si el módulo hfi1 se carga con HFI1_CAP_SDMA desactivado, una llamada a hfi1_write_iter() desreferenciará un puntero NULL y generará pánico. Un marco de pila típico es: sdma_select_user_engine [hfi1] hfi1_user_sdma_process_request [hfi1] hfi1_write_iter [hfi1] do_iter_readv_writev do_iter_write vfs_writev do_writev do_syscall_64 La solución es probar SDMA en hfi1_write_iter() y fallar la E/S con EINVAL.
References () https://git.kernel.org/stable/c/0e4dda8b3f4c07ee9ea670a10ea3171a5e63a86f - () https://git.kernel.org/stable/c/0e4dda8b3f4c07ee9ea670a10ea3171a5e63a86f - Patch
References () https://git.kernel.org/stable/c/22e7e400fd1a890db2ea13686324aff50e972f4f - () https://git.kernel.org/stable/c/22e7e400fd1a890db2ea13686324aff50e972f4f - Patch
References () https://git.kernel.org/stable/c/29952ab85d6c3fe0b7909d9a737f10c58bf6824d - () https://git.kernel.org/stable/c/29952ab85d6c3fe0b7909d9a737f10c58bf6824d - Patch
References () https://git.kernel.org/stable/c/32e6aea33944f364d51cd263e4cd236393a188b6 - () https://git.kernel.org/stable/c/32e6aea33944f364d51cd263e4cd236393a188b6 - Patch
References () https://git.kernel.org/stable/c/33794e8e9bcb4affc0ebff9cdec85acc8b8a1762 - () https://git.kernel.org/stable/c/33794e8e9bcb4affc0ebff9cdec85acc8b8a1762 - Patch
References () https://git.kernel.org/stable/c/629e052d0c98e46dde9f0824f0aa437f678d9b8f - () https://git.kernel.org/stable/c/629e052d0c98e46dde9f0824f0aa437f678d9b8f - Patch
References () https://git.kernel.org/stable/c/cc80d3c37cec9d6ddb140483647901bc7cc6c31d - () https://git.kernel.org/stable/c/cc80d3c37cec9d6ddb140483647901bc7cc6c31d - Patch
References () https://git.kernel.org/stable/c/e60ad83f645ee6fadd5a8057ba267aeec54f08fe - () https://git.kernel.org/stable/c/e60ad83f645ee6fadd5a8057ba267aeec54f08fe - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-22 17:27


NVD link : CVE-2022-49429

Mitre link : CVE-2022-49429

CVE.ORG link : CVE-2022-49429


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference