CVE-2022-48707

Source
https://cve.org/CVERecord?id=CVE-2022-48707
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48707.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-48707
Downstream
Published
2024-05-21T15:22:48.735Z
Modified
2026-04-02T08:26:53.812889Z
Summary
cxl/region: Fix null pointer dereference for resetting decoder
Details

In the Linux kernel, the following vulnerability has been resolved:

cxl/region: Fix null pointer dereference for resetting decoder

Not all decoders have a reset callback.

The CXL specification allows a host bridge with a single root port to have no explicit HDM decoders. Currently the region driver assumes there are none. As such the CXL core creates a special pass through decoder instance without a commit/reset callback.

Prior to this patch, the ->reset() callback was called unconditionally when calling cxlregiondecode_reset. Thus a configuration with 1 Host Bridge, 1 Root Port, and one directly attached CXL type 3 device or multiple CXL type 3 devices attached to downstream ports of a switch can cause a null pointer dereference.

Before the fix, a kernel crash was observed when we destroy the region, and a pass through decoder is reset.

The issue can be reproduced as below, 1) create a region with a CXL setup which includes a HB with a single root port under which a memdev is attached directly. 2) destroy the region with cxl destroy-region regionX -f.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48707.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
176baefb2eb5d7a3ddebe3ff803db1fce44574b5
Fixed
a04c7d062b537ff787d00da95bdfe343260d4beb
Fixed
4fa4302d6dc7de7e8e74dc7405611a2efb4bf54b

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-48707.json"