First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Prevent panic when SDMA is disabled If the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to hfi1_write_iter() will dereference a NULL pointer and panic. A typical stack frame is: sdma_select_user_engine [hfi1] hfi1_user_sdma_process_request [hfi1] hfi1_write_iter [hfi1] do_iter_readv_writev do_iter_write vfs_writev do_writev do_syscall_64 The fix is to test for SDMA in hfi1_write_iter() and fail the I/O with EINVAL.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49429 has a medium severity level due to its potential to cause system panic.
CVE-2022-49429 causes a null pointer dereference and system panic when the hfi1 module is loaded without SDMA capability.
To mitigate CVE-2022-49429, ensure that the hfi1 module is not loaded with HFI1_CAP_SDMA off or update the Linux kernel to the latest patched version.
CVE-2022-49429 affects certain versions of the Linux kernel that utilize the hfi1 module with SDMA capability disabled.
CVE-2022-49429 is not considered remotely exploitable as it requires local privilege to trigger the panic.