CVE-2022-49433

In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Prevent use of lock before it is initialized If there is a failure during probe of hfi1 before the sdma_map_lock is initialized, the call to hfi1_free_devdata() will attempt to use a lock that has not been initialized. If the locking correctness validator is on then an INFO message and stack trace resembling the following may be seen: INFO: trying to register non-static key. The code is fine but needs lockdep annotation, or maybe you didn't initialize this object before use? turning off the locking correctness validator. Call Trace: register_lock_class+0x11b/0x880 __lock_acquire+0xf3/0x7930 lock_acquire+0xff/0x2d0 _raw_spin_lock_irq+0x46/0x60 sdma_clean+0x42a/0x660 [hfi1] hfi1_free_devdata+0x3a7/0x420 [hfi1] init_one+0x867/0x11a0 [hfi1] pci_device_probe+0x40e/0x8d0 The use of sdma_map_lock in sdma_clean() is for freeing the sdma_map memory, and sdma_map is not allocated/initialized until after sdma_map_lock has been initialized. This code only needs to be run if sdma_map is not NULL, and so checking for that condition will avoid trying to use the lock before it is initialized.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Oct 2025, 17:26

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hfi1: Evitar el uso del bloqueo antes de que se inicialice Si hay un error durante el sondeo de hfi1 antes de que se inicialice sdma_map_lock, la llamada a hfi1_free_devdata() intentará usar un bloqueo que no se ha inicializado. Si el validador de corrección de bloqueo está activado, se puede ver un mensaje INFO y un seguimiento de pila similar al siguiente: INFO: intentando registrar una clave no estática. El código está bien, pero necesita la anotación lockdep, o tal vez no inicializó este objeto antes de usarlo. desactivando el validador de corrección de bloqueo. Rastreo de llamadas: register_lock_class+0x11b/0x880 __lock_acquire+0xf3/0x7930 lock_acquire+0xff/0x2d0 _raw_spin_lock_irq+0x46/0x60 sdma_clean+0x42a/0x660 [hfi1] hfi1_free_devdata+0x3a7/0x420 [hfi1] init_one+0x867/0x11a0 [hfi1] pci_device_probe+0x40e/0x8d0 El uso de sdma_map_lock en sdma_clean() es para liberar la memoria sdma_map, y sdma_map no se asigna/inicializa hasta que se haya inicializado sdma_map_lock. Este código solo necesita ejecutarse si sdma_map no es NULL, por lo que verificar esa condición evitará intentar usar el bloqueo antes de que se inicialice.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-908
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/05c03dfd09c069c4ffd783b47b2da5dcc9421f2c - () https://git.kernel.org/stable/c/05c03dfd09c069c4ffd783b47b2da5dcc9421f2c - Patch
References () https://git.kernel.org/stable/c/288d198f50434f29b4a26a9de4394ae2305ad8af - () https://git.kernel.org/stable/c/288d198f50434f29b4a26a9de4394ae2305ad8af - Patch
References () https://git.kernel.org/stable/c/30eb275e7ed588270ae159cc590a96658e0cfd8f - () https://git.kernel.org/stable/c/30eb275e7ed588270ae159cc590a96658e0cfd8f - Patch
References () https://git.kernel.org/stable/c/66090815a24ce14cf51ef5453fc0218fe8a39bc2 - () https://git.kernel.org/stable/c/66090815a24ce14cf51ef5453fc0218fe8a39bc2 - Patch
References () https://git.kernel.org/stable/c/addb192000d8819c0b1553453994df9bb54c28db - () https://git.kernel.org/stable/c/addb192000d8819c0b1553453994df9bb54c28db - Patch
References () https://git.kernel.org/stable/c/ca55150bff5817af4f857a746ecab9862c23e12a - () https://git.kernel.org/stable/c/ca55150bff5817af4f857a746ecab9862c23e12a - Patch
References () https://git.kernel.org/stable/c/fc0750e659db7b315bf6348902cc8ca3cdd4b8d8 - () https://git.kernel.org/stable/c/fc0750e659db7b315bf6348902cc8ca3cdd4b8d8 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-22 17:26


NVD link : CVE-2022-49433

Mitre link : CVE-2022-49433

CVE.ORG link : CVE-2022-49433


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-908

Use of Uninitialized Resource