We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50129

RDMA/srpt: Fix a use-after-free



Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Fix a use-after-free Change the LIO port members inside struct srpt_port from regular members into pointers. Allocate the LIO port data structures from inside srpt_make_tport() and free these from inside srpt_make_tport(). Keep struct srpt_device as long as either an RDMA port or a LIO target port is associated with it. This patch decouples the lifetime of struct srpt_port (controlled by the RDMA core) and struct srpt_port_id (controlled by LIO). This patch fixes the following KASAN complaint: BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt] Read of size 8 at addr ffff888141cc34b8 by task check/5093 Call Trace: <TASK> show_stack+0x4e/0x53 dump_stack_lvl+0x51/0x66 print_address_description.constprop.0.cold+0xea/0x41e print_report.cold+0x90/0x205 kasan_report+0xb9/0xf0 __asan_load8+0x69/0x90 srpt_enable_tpg+0x31/0x70 [ib_srpt] target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod] configfs_write_iter+0x18b/0x210 new_sync_write+0x1f2/0x2f0 vfs_write+0x3e3/0x540 ksys_write+0xbb/0x140 __x64_sys_write+0x42/0x50 do_syscall_64+0x34/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 </TASK>

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

a42d985bd5b234da8b61347a78dc3057bf7bb94d before de95b52d9aabc979166aba81ccbe623aaf9c16a1
affected

a42d985bd5b234da8b61347a78dc3057bf7bb94d before e60d7e2462bf57273563c4e00dbfa79ee973b9e2
affected

a42d985bd5b234da8b61347a78dc3057bf7bb94d before 4ee8c39968a648d58b273582d4b021044a41ee5e
affected

a42d985bd5b234da8b61347a78dc3057bf7bb94d before 388326bb1c32fcd09371c1d494af71471ef3a04b
affected

a42d985bd5b234da8b61347a78dc3057bf7bb94d before b5605148e6ce36bb21020d49010b617693933128
affected

Default status
affected

3.3
affected

Any version before 3.3
unaffected

5.10.137
unaffected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/de95b52d9aabc979166aba81ccbe623aaf9c16a1

git.kernel.org/...c/e60d7e2462bf57273563c4e00dbfa79ee973b9e2

git.kernel.org/...c/4ee8c39968a648d58b273582d4b021044a41ee5e

git.kernel.org/...c/388326bb1c32fcd09371c1d494af71471ef3a04b

git.kernel.org/...c/b5605148e6ce36bb21020d49010b617693933128

cve.org (CVE-2022-50129)

nvd.nist.gov (CVE-2022-50129)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50129

Support options

Helpdesk Chat, Email, Knowledgebase