Home

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed There is a null-ptr-deref when mount.cifs over rdma: BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe] Read of size 8 at addr 0000000000000018 by task mount.cifs/3046 CPU: 2 PID: 3046 Comm: mount.cifs Not tainted 6.1.0-rc5+ #62 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc3 Call Trace: <TASK> dump_stack_lvl+0x34/0x44 kasan_report+0xad/0x130 rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe] execute_in_process_context+0x25/0x90 __rxe_cleanup+0x101/0x1d0 [rdma_rxe] rxe_create_qp+0x16a/0x180 [rdma_rxe] create_qp.part.0+0x27d/0x340 ib_create_qp_kernel+0x73/0x160 rdma_create_qp+0x100/0x230 _smbd_get_connection+0x752/0x20f0 smbd_get_connection+0x21/0x40 cifs_get_tcp_session+0x8ef/0xda0 mount_get_conns+0x60/0x750 cifs_mount+0x103/0xd00 cifs_smb3_do_mount+0x1dd/0xcb0 smb3_get_tree+0x1d5/0x300 vfs_get_tree+0x41/0xf0 path_mount+0x9b3/0xdd0 __x64_sys_mount+0x190/0x1d0 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 The root cause of the issue is the socket create failed in rxe_qp_init_req(). So move the reset rxe_qp_do_cleanup() after the NULL ptr check.

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before ee24de095569935eba600f7735e8e8ddea5b418e
affected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before 7340ca9f782be6fbe3f64a134dc112772764f766
affected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before bd7106a6004f1077a365ca7f5a99c7a708e20714
affected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before 6bb5a62bfd624039b05157745c234068508393a9
affected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before f64f08b9e6fb305a25dd75329e06ae342b9ce336
affected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before 5b924632d84a60bc0c7fe6e9bbbce99d03908957
affected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before 821f9a18210f6b9fd6792471714c799607b25db4
affected

8700e3e7c4857d28ebaa824509934556da0b3e76 (git) before f67376d801499f4fa0838c18c1efcad8840e550d
affected

Default status
affected

4.8
affected

Any version before 4.8
unaffected

4.14.303 (semver)
unaffected

4.19.270 (semver)
unaffected

5.4.229 (semver)
unaffected

5.10.163 (semver)
unaffected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ee24de095569935eba600f7735e8e8ddea5b418e

git.kernel.org/...c/7340ca9f782be6fbe3f64a134dc112772764f766

git.kernel.org/...c/bd7106a6004f1077a365ca7f5a99c7a708e20714

git.kernel.org/...c/6bb5a62bfd624039b05157745c234068508393a9

git.kernel.org/...c/f64f08b9e6fb305a25dd75329e06ae342b9ce336

git.kernel.org/...c/5b924632d84a60bc0c7fe6e9bbbce99d03908957

git.kernel.org/...c/821f9a18210f6b9fd6792471714c799607b25db4

git.kernel.org/...c/f67376d801499f4fa0838c18c1efcad8840e550d

cve.org (CVE-2022-50885)

nvd.nist.gov (CVE-2022-50885)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.