cve-2022-49925
Vulnerability from cvelistv5
Published
2025-05-01 14:11
Modified
2025-05-01 14:11
Severity ?
EPSS score ?
Summary
RDMA/core: Fix null-ptr-deref in ib_core_cleanup()
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/infiniband/core/device.c", "drivers/infiniband/core/nldev.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "af8fb5a0600e9ae29950e9422a032c3c22649ee5", "status": "affected", "version": "03db3a2d81e6e84f3ed3cb9e087cae17d762642b", "versionType": "git" }, { "lessThan": "d360e875c011a005628525bf290322058927e7dc", "status": "affected", "version": "03db3a2d81e6e84f3ed3cb9e087cae17d762642b", "versionType": "git" }, { "lessThan": "6b3d5dcb12347f3518308c2c9d2cf72453a3e1e5", "status": "affected", "version": "03db3a2d81e6e84f3ed3cb9e087cae17d762642b", "versionType": "git" }, { "lessThan": "ab817f75e5e0fa58d9be0825da6a7b7d8a1fa1d9", "status": "affected", "version": "03db3a2d81e6e84f3ed3cb9e087cae17d762642b", "versionType": "git" }, { "lessThan": "07c0d131cc0fe1f3981a42958fc52d573d303d89", "status": "affected", "version": "03db3a2d81e6e84f3ed3cb9e087cae17d762642b", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/infiniband/core/device.c", "drivers/infiniband/core/nldev.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "4.3" }, { "lessThan": "4.3", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.*", "status": "unaffected", "version": "5.4.224", "versionType": "semver" }, { "lessThanOrEqual": "5.10.*", "status": "unaffected", "version": "5.10.154", "versionType": "semver" }, { "lessThanOrEqual": "5.15.*", "status": "unaffected", "version": "5.15.78", "versionType": "semver" }, { "lessThanOrEqual": "6.0.*", "status": "unaffected", "version": "6.0.8", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.1", "versionType": "original_commit_for_fix" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Fix null-ptr-deref in ib_core_cleanup()\n\nKASAN reported a null-ptr-deref error:\n\n KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]\n CPU: 1 PID: 379\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n RIP: 0010:destroy_workqueue+0x2f/0x740\n RSP: 0018:ffff888016137df8 EFLAGS: 00000202\n ...\n Call Trace:\n ib_core_cleanup+0xa/0xa1 [ib_core]\n __do_sys_delete_module.constprop.0+0x34f/0x5b0\n do_syscall_64+0x3a/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n RIP: 0033:0x7fa1a0d221b7\n ...\n\nIt is because the fail of roce_gid_mgmt_init() is ignored:\n\n ib_core_init()\n roce_gid_mgmt_init()\n gid_cache_wq = alloc_ordered_workqueue # fail\n ...\n ib_core_cleanup()\n roce_gid_mgmt_cleanup()\n destroy_workqueue(gid_cache_wq)\n # destroy an unallocated wq\n\nFix this by catching the fail of roce_gid_mgmt_init() in ib_core_init()." } ], "providerMetadata": { "dateUpdated": "2025-05-01T14:11:03.960Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/af8fb5a0600e9ae29950e9422a032c3c22649ee5" }, { "url": "https://git.kernel.org/stable/c/d360e875c011a005628525bf290322058927e7dc" }, { "url": "https://git.kernel.org/stable/c/6b3d5dcb12347f3518308c2c9d2cf72453a3e1e5" }, { "url": "https://git.kernel.org/stable/c/ab817f75e5e0fa58d9be0825da6a7b7d8a1fa1d9" }, { "url": "https://git.kernel.org/stable/c/07c0d131cc0fe1f3981a42958fc52d573d303d89" } ], "title": "RDMA/core: Fix null-ptr-deref in ib_core_cleanup()", "x_generator": { "engine": "bippy-1.1.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-49925", "datePublished": "2025-05-01T14:11:03.960Z", "dateReserved": "2025-05-01T14:05:17.253Z", "dateUpdated": "2025-05-01T14:11:03.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-49925\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-01T15:16:18.337\",\"lastModified\":\"2025-05-02T13:52:51.693\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRDMA/core: Fix null-ptr-deref in ib_core_cleanup()\\n\\nKASAN reported a null-ptr-deref error:\\n\\n KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]\\n CPU: 1 PID: 379\\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\\n RIP: 0010:destroy_workqueue+0x2f/0x740\\n RSP: 0018:ffff888016137df8 EFLAGS: 00000202\\n ...\\n Call Trace:\\n ib_core_cleanup+0xa/0xa1 [ib_core]\\n __do_sys_delete_module.constprop.0+0x34f/0x5b0\\n do_syscall_64+0x3a/0x90\\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n RIP: 0033:0x7fa1a0d221b7\\n ...\\n\\nIt is because the fail of roce_gid_mgmt_init() is ignored:\\n\\n ib_core_init()\\n roce_gid_mgmt_init()\\n gid_cache_wq = alloc_ordered_workqueue # fail\\n ...\\n ib_core_cleanup()\\n roce_gid_mgmt_cleanup()\\n destroy_workqueue(gid_cache_wq)\\n # destroy an unallocated wq\\n\\nFix this by catching the fail of roce_gid_mgmt_init() in ib_core_init().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/core: Fix null-ptr-deref en ib_core_cleanup() KASAN inform\u00f3 un error null-ptr-deref: KASAN: null-ptr-deref en el rango [0x0000000000000118-0x000000000000011f] CPU: 1 PID: 379 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:destroy_workqueue+0x2f/0x740 RSP: 0018:ffff888016137df8 EFLAGS: 00000202 ... Seguimiento de llamadas: ib_core_cleanup+0xa/0xa1 [ib_core] __do_sys_delete_module.constprop.0+0x34f/0x5b0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fa1a0d221b7 ... It is because the fail of roce_gid_mgmt_init() is ignored: ib_core_init() roce_gid_mgmt_init() gid_cache_wq = alloc_ordered_workqueue # fail ... ib_core_cleanup() roce_gid_mgmt_cleanup() destroy_workqueue(gid_cache_wq) # destroy an unallocated wq Fix this by catching the fail of roce_gid_mgmt_init() in ib_core_init(). \"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/07c0d131cc0fe1f3981a42958fc52d573d303d89\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6b3d5dcb12347f3518308c2c9d2cf72453a3e1e5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ab817f75e5e0fa58d9be0825da6a7b7d8a1fa1d9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/af8fb5a0600e9ae29950e9422a032c3c22649ee5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d360e875c011a005628525bf290322058927e7dc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.