CVE-2022-49429
26.02.2025, 07:01
In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Prevent panic when SDMA is disabled If the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to hfi1_write_iter() will dereference a NULL pointer and panic. A typical stack frame is: sdma_select_user_engine [hfi1] hfi1_user_sdma_process_request [hfi1] hfi1_write_iter [hfi1] do_iter_readv_writev do_iter_write vfs_writev do_writev do_syscall_64 The fix is to test for SDMA in hfi1_write_iter() and fail the I/O with EINVAL.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 𝑥 < 4.14.283 |
| linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.247 |
| linux | linux_kernel | 4.20 ≤ 𝑥 < 5.4.198 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.121 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.46 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 5.17.14 |
| linux | linux_kernel | 5.18 ≤ 𝑥 < 5.18.3 |
𝑥
= Vulnerable software versions
Debian Releases
Common Weakness Enumeration
References