CVE-2022-49429

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's hfi1 RDMA driver causes kernel panic when SDMA capability is disabled. This affects systems using the hfi1 driver with HFI1_CAP_SDMA disabled, potentially causing denial of service through system crashes.

💻 Affected Systems

Products:
  • Linux kernel with hfi1 RDMA driver
Versions: Linux kernel versions before fixes in stable releases (specific commits: 0e4dda8b3f4c, 22e7e400fd1a, 29952ab85d6c, 32e6aea33944, 33794e8e9bcb)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when hfi1 module is loaded with HFI1_CAP_SDMA capability disabled. Requires RDMA hardware and hfi1 driver usage.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash/kernel panic leading to denial of service, requiring physical or remote reboot.

🟠

Likely Case

System crash when specific RDMA operations are attempted with SDMA disabled, causing temporary service disruption.

🟢

If Mitigated

Failed I/O operations with EINVAL error instead of crash when proper patch is applied.

🌐 Internet-Facing: LOW - Requires local access or specific RDMA network access to trigger.
🏢 Internal Only: MEDIUM - Internal users or services with RDMA access could trigger crashes affecting shared systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple trigger via write operations when SDMA is disabled.

Exploitation requires ability to perform RDMA write operations with hfi1 driver loaded in vulnerable configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel stable releases containing the fix commits

Vendor Advisory: https://git.kernel.org/stable/c/0e4dda8b3f4c07ee9ea670a10ea3171a5e63a86f

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fix commits. 2. Reboot system to load patched kernel. 3. Verify hfi1 module loads correctly.

🔧 Temporary Workarounds

Disable hfi1 module

linux

Prevent loading of vulnerable hfi1 RDMA driver module

echo 'blacklist hfi1' >> /etc/modprobe.d/blacklist.conf
rmmod hfi1

Enable SDMA capability

linux

Load hfi1 module with SDMA capability enabled to avoid NULL pointer dereference

modprobe hfi1 HFI1_CAP_SDMA=1

🧯 If You Can't Patch

  • Ensure hfi1 module is loaded with HFI1_CAP_SDMA=1 parameter
  • Restrict RDMA access to trusted users and services only

🔍 How to Verify

Check if Vulnerable:

Check if hfi1 module is loaded and SDMA capability status: lsmod | grep hfi1 && cat /sys/module/hfi1/parameters/HFI1_CAP_SDMA

Check Version:

uname -r

Verify Fix Applied:

Check kernel version contains fix commits: uname -r and verify against patched versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or dmesg
  • NULL pointer dereference errors mentioning hfi1_write_iter or sdma_select_user_engine

Network Indicators:

  • Unexpected RDMA connection failures
  • System crashes during RDMA operations

SIEM Query:

kernel: *panic* OR *NULL pointer dereference* AND (*hfi1* OR *sdma_select_user_engine*)

🔗 References

📤 Share & Export