CVE-2022-50475 (GCVE-0-2022-50475)
Vulnerability from cvelistv5
Published
2025-10-04 15:16
Modified
2025-10-04 15:16
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Make sure "ib_port" is valid when access sysfs node The "ib_port" structure must be set before adding the sysfs kobject, and reset after removing it, otherwise it may crash when accessing the sysfs node: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050 Mem abort info: ESR = 0x96000006 Exception class = DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000e85f5ba5 [0000000000000050] pgd=0000000848fd9003, pud=000000085b387003, pmd=0000000000000000 Internal error: Oops: 96000006 [#2] PREEMPT SMP Modules linked in: ib_umad(O) mlx5_ib(O) nfnetlink_cttimeout(E) nfnetlink(E) act_gact(E) cls_flower(E) sch_ingress(E) openvswitch(E) nsh(E) nf_nat_ipv6(E) nf_nat_ipv4(E) nf_conncount(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) mst_pciconf(O) ipmi_devintf(E) ipmi_msghandler(E) ipmb_dev_int(OE) mlx5_core(O) mlxfw(O) mlxdevm(O) auxiliary(O) ib_uverbs(O) ib_core(O) mlx_compat(O) psample(E) sbsa_gwdt(E) uio_pdrv_genirq(E) uio(E) mlxbf_pmc(OE) mlxbf_gige(OE) mlxbf_tmfifo(OE) gpio_mlxbf2(OE) pwr_mlxbf(OE) mlx_trio(OE) i2c_mlxbf(OE) mlx_bootctl(OE) bluefield_edac(OE) knem(O) ip_tables(E) ipv6(E) crc_ccitt(E) [last unloaded: mst_pci] Process grep (pid: 3372, stack limit = 0x0000000022055c92) CPU: 5 PID: 3372 Comm: grep Tainted: G D OE 4.19.161-mlnx.47.gadcd9e3 #1 Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS BlueField:3.9.2-15-ga2403ab Sep 8 2022 pstate: 40000005 (nZcv daif -PAN -UAO) pc : hw_stat_port_show+0x4c/0x80 [ib_core] lr : port_attr_show+0x40/0x58 [ib_core] sp : ffff000029f43b50 x29: ffff000029f43b50 x28: 0000000019375000 x27: ffff8007b821a540 x26: ffff000029f43e30 x25: 0000000000008000 x24: ffff000000eaa958 x23: 0000000000001000 x22: ffff8007a4ce3000 x21: ffff8007baff8000 x20: ffff8007b9066ac0 x19: ffff8007bae97578 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 x8 : ffff8007a4ce4000 x7 : 0000000000000000 x6 : 000000000000003f x5 : ffff000000e6a280 x4 : ffff8007a4ce3000 x3 : 0000000000000000 x2 : aaaaaaaaaaaaaaab x1 : ffff8007b9066a10 x0 : ffff8007baff8000 Call trace: hw_stat_port_show+0x4c/0x80 [ib_core] port_attr_show+0x40/0x58 [ib_core] sysfs_kf_seq_show+0x8c/0x150 kernfs_seq_show+0x44/0x50 seq_read+0x1b4/0x45c kernfs_fop_read+0x148/0x1d8 __vfs_read+0x58/0x180 vfs_read+0x94/0x154 ksys_read+0x68/0xd8 __arm64_sys_read+0x28/0x34 el0_svc_common+0x88/0x18c el0_svc_handler+0x78/0x94 el0_svc+0x8/0xe8 Code: f2955562 aa1603e4 aa1503e0 f9405683 (f9402861)
Impacted products
Vendor Product Version
Linux Linux Version: d8a5883814b9f7c08d7ff291070687d925b4f859
Version: d8a5883814b9f7c08d7ff291070687d925b4f859
Version: d8a5883814b9f7c08d7ff291070687d925b4f859
Version: d8a5883814b9f7c08d7ff291070687d925b4f859
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/infiniband/core/sysfs.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "f981c697b2f9bd5dd2f060e47ff8b5e0a2cd0c06",
              "status": "affected",
              "version": "d8a5883814b9f7c08d7ff291070687d925b4f859",
              "versionType": "git"
            },
            {
              "lessThan": "ac7a7d7079124f46180714b2d41a1703d37101bb",
              "status": "affected",
              "version": "d8a5883814b9f7c08d7ff291070687d925b4f859",
              "versionType": "git"
            },
            {
              "lessThan": "cd06d32a71fbb198b2d43dddf794badd80ffd25d",
              "status": "affected",
              "version": "d8a5883814b9f7c08d7ff291070687d925b4f859",
              "versionType": "git"
            },
            {
              "lessThan": "5e15ff29b156bbbdeadae230c8ecd5ecd8ca2477",
              "status": "affected",
              "version": "d8a5883814b9f7c08d7ff291070687d925b4f859",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/infiniband/core/sysfs.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.14"
            },
            {
              "lessThan": "5.14",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.86",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.*",
              "status": "unaffected",
              "version": "6.0.16",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.2",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.86",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0.16",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.2",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Make sure \"ib_port\" is valid when access sysfs node\n\nThe \"ib_port\" structure must be set before adding the sysfs kobject,\nand reset after removing it, otherwise it may crash when accessing\nthe sysfs node:\n  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n  Mem abort info:\n    ESR = 0x96000006\n    Exception class = DABT (current EL), IL = 32 bits\n    SET = 0, FnV = 0\n    EA = 0, S1PTW = 0\n  Data abort info:\n    ISV = 0, ISS = 0x00000006\n    CM = 0, WnR = 0\n  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000e85f5ba5\n  [0000000000000050] pgd=0000000848fd9003, pud=000000085b387003, pmd=0000000000000000\n  Internal error: Oops: 96000006 [#2] PREEMPT SMP\n  Modules linked in: ib_umad(O) mlx5_ib(O) nfnetlink_cttimeout(E) nfnetlink(E) act_gact(E) cls_flower(E) sch_ingress(E) openvswitch(E) nsh(E) nf_nat_ipv6(E) nf_nat_ipv4(E) nf_conncount(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) mst_pciconf(O) ipmi_devintf(E) ipmi_msghandler(E) ipmb_dev_int(OE) mlx5_core(O) mlxfw(O) mlxdevm(O) auxiliary(O) ib_uverbs(O) ib_core(O) mlx_compat(O) psample(E) sbsa_gwdt(E) uio_pdrv_genirq(E) uio(E) mlxbf_pmc(OE) mlxbf_gige(OE) mlxbf_tmfifo(OE) gpio_mlxbf2(OE) pwr_mlxbf(OE) mlx_trio(OE) i2c_mlxbf(OE) mlx_bootctl(OE) bluefield_edac(OE) knem(O) ip_tables(E) ipv6(E) crc_ccitt(E) [last unloaded: mst_pci]\n  Process grep (pid: 3372, stack limit = 0x0000000022055c92)\n  CPU: 5 PID: 3372 Comm: grep Tainted: G      D    OE     4.19.161-mlnx.47.gadcd9e3 #1\n  Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS BlueField:3.9.2-15-ga2403ab Sep  8 2022\n  pstate: 40000005 (nZcv daif -PAN -UAO)\n  pc : hw_stat_port_show+0x4c/0x80 [ib_core]\n  lr : port_attr_show+0x40/0x58 [ib_core]\n  sp : ffff000029f43b50\n  x29: ffff000029f43b50 x28: 0000000019375000\n  x27: ffff8007b821a540 x26: ffff000029f43e30\n  x25: 0000000000008000 x24: ffff000000eaa958\n  x23: 0000000000001000 x22: ffff8007a4ce3000\n  x21: ffff8007baff8000 x20: ffff8007b9066ac0\n  x19: ffff8007bae97578 x18: 0000000000000000\n  x17: 0000000000000000 x16: 0000000000000000\n  x15: 0000000000000000 x14: 0000000000000000\n  x13: 0000000000000000 x12: 0000000000000000\n  x11: 0000000000000000 x10: 0000000000000000\n  x9 : 0000000000000000 x8 : ffff8007a4ce4000\n  x7 : 0000000000000000 x6 : 000000000000003f\n  x5 : ffff000000e6a280 x4 : ffff8007a4ce3000\n  x3 : 0000000000000000 x2 : aaaaaaaaaaaaaaab\n  x1 : ffff8007b9066a10 x0 : ffff8007baff8000\n  Call trace:\n   hw_stat_port_show+0x4c/0x80 [ib_core]\n   port_attr_show+0x40/0x58 [ib_core]\n   sysfs_kf_seq_show+0x8c/0x150\n   kernfs_seq_show+0x44/0x50\n   seq_read+0x1b4/0x45c\n   kernfs_fop_read+0x148/0x1d8\n   __vfs_read+0x58/0x180\n   vfs_read+0x94/0x154\n   ksys_read+0x68/0xd8\n   __arm64_sys_read+0x28/0x34\n   el0_svc_common+0x88/0x18c\n   el0_svc_handler+0x78/0x94\n   el0_svc+0x8/0xe8\n  Code: f2955562 aa1603e4 aa1503e0 f9405683 (f9402861)"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-04T15:16:36.235Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/f981c697b2f9bd5dd2f060e47ff8b5e0a2cd0c06"
        },
        {
          "url": "https://git.kernel.org/stable/c/ac7a7d7079124f46180714b2d41a1703d37101bb"
        },
        {
          "url": "https://git.kernel.org/stable/c/cd06d32a71fbb198b2d43dddf794badd80ffd25d"
        },
        {
          "url": "https://git.kernel.org/stable/c/5e15ff29b156bbbdeadae230c8ecd5ecd8ca2477"
        }
      ],
      "title": "RDMA/core: Make sure \"ib_port\" is valid when access sysfs node",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-50475",
    "datePublished": "2025-10-04T15:16:36.235Z",
    "dateReserved": "2025-10-04T15:13:33.467Z",
    "dateUpdated": "2025-10-04T15:16:36.235Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-50475\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-04T16:15:44.050\",\"lastModified\":\"2025-10-06T14:56:47.823\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRDMA/core: Make sure \\\"ib_port\\\" is valid when access sysfs node\\n\\nThe \\\"ib_port\\\" structure must be set before adding the sysfs kobject,\\nand reset after removing it, otherwise it may crash when accessing\\nthe sysfs node:\\n  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\\n  Mem abort info:\\n    ESR = 0x96000006\\n    Exception class = DABT (current EL), IL = 32 bits\\n    SET = 0, FnV = 0\\n    EA = 0, S1PTW = 0\\n  Data abort info:\\n    ISV = 0, ISS = 0x00000006\\n    CM = 0, WnR = 0\\n  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000e85f5ba5\\n  [0000000000000050] pgd=0000000848fd9003, pud=000000085b387003, pmd=0000000000000000\\n  Internal error: Oops: 96000006 [#2] PREEMPT SMP\\n  Modules linked in: ib_umad(O) mlx5_ib(O) nfnetlink_cttimeout(E) nfnetlink(E) act_gact(E) cls_flower(E) sch_ingress(E) openvswitch(E) nsh(E) nf_nat_ipv6(E) nf_nat_ipv4(E) nf_conncount(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) mst_pciconf(O) ipmi_devintf(E) ipmi_msghandler(E) ipmb_dev_int(OE) mlx5_core(O) mlxfw(O) mlxdevm(O) auxiliary(O) ib_uverbs(O) ib_core(O) mlx_compat(O) psample(E) sbsa_gwdt(E) uio_pdrv_genirq(E) uio(E) mlxbf_pmc(OE) mlxbf_gige(OE) mlxbf_tmfifo(OE) gpio_mlxbf2(OE) pwr_mlxbf(OE) mlx_trio(OE) i2c_mlxbf(OE) mlx_bootctl(OE) bluefield_edac(OE) knem(O) ip_tables(E) ipv6(E) crc_ccitt(E) [last unloaded: mst_pci]\\n  Process grep (pid: 3372, stack limit = 0x0000000022055c92)\\n  CPU: 5 PID: 3372 Comm: grep Tainted: G      D    OE     4.19.161-mlnx.47.gadcd9e3 #1\\n  Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS BlueField:3.9.2-15-ga2403ab Sep  8 2022\\n  pstate: 40000005 (nZcv daif -PAN -UAO)\\n  pc : hw_stat_port_show+0x4c/0x80 [ib_core]\\n  lr : port_attr_show+0x40/0x58 [ib_core]\\n  sp : ffff000029f43b50\\n  x29: ffff000029f43b50 x28: 0000000019375000\\n  x27: ffff8007b821a540 x26: ffff000029f43e30\\n  x25: 0000000000008000 x24: ffff000000eaa958\\n  x23: 0000000000001000 x22: ffff8007a4ce3000\\n  x21: ffff8007baff8000 x20: ffff8007b9066ac0\\n  x19: ffff8007bae97578 x18: 0000000000000000\\n  x17: 0000000000000000 x16: 0000000000000000\\n  x15: 0000000000000000 x14: 0000000000000000\\n  x13: 0000000000000000 x12: 0000000000000000\\n  x11: 0000000000000000 x10: 0000000000000000\\n  x9 : 0000000000000000 x8 : ffff8007a4ce4000\\n  x7 : 0000000000000000 x6 : 000000000000003f\\n  x5 : ffff000000e6a280 x4 : ffff8007a4ce3000\\n  x3 : 0000000000000000 x2 : aaaaaaaaaaaaaaab\\n  x1 : ffff8007b9066a10 x0 : ffff8007baff8000\\n  Call trace:\\n   hw_stat_port_show+0x4c/0x80 [ib_core]\\n   port_attr_show+0x40/0x58 [ib_core]\\n   sysfs_kf_seq_show+0x8c/0x150\\n   kernfs_seq_show+0x44/0x50\\n   seq_read+0x1b4/0x45c\\n   kernfs_fop_read+0x148/0x1d8\\n   __vfs_read+0x58/0x180\\n   vfs_read+0x94/0x154\\n   ksys_read+0x68/0xd8\\n   __arm64_sys_read+0x28/0x34\\n   el0_svc_common+0x88/0x18c\\n   el0_svc_handler+0x78/0x94\\n   el0_svc+0x8/0xe8\\n  Code: f2955562 aa1603e4 aa1503e0 f9405683 (f9402861)\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5e15ff29b156bbbdeadae230c8ecd5ecd8ca2477\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ac7a7d7079124f46180714b2d41a1703d37101bb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cd06d32a71fbb198b2d43dddf794badd80ffd25d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f981c697b2f9bd5dd2f060e47ff8b5e0a2cd0c06\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…