vulnerability

Red Hat: CVE-2022-50058: kernel: vdpa_sim_blk: set number of address spaces and virtqueue groups

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
Jun 18, 2025
Added
Jul 9, 2025
Modified
Jul 10, 2025

Description

In the Linux kernel, the following vulnerability has been resolved:

vdpa_sim_blk: set number of address spaces and virtqueue groups

Commit bda324fd037a ("vdpasim: control virtqueue support") added two
new fields (nas, ngroups) to vdpasim_dev_attr, but we forgot to
initialize them for vdpa_sim_blk.

When creating a new vdpa_sim_blk device this causes the kernel
to panic in this way:
   $ vdpa dev add mgmtdev vdpasim_blk name blk0
   BUG: kernel NULL pointer dereference, address: 0000000000000030
   ...
   RIP: 0010:vhost_iotlb_add_range_ctx+0x41/0x220 [vhost_iotlb]
   ...
   Call Trace:
    <TASK>
    vhost_iotlb_add_range+0x11/0x800 [vhost_iotlb]
    vdpasim_map_range+0x91/0xd0 [vdpa_sim]
    vdpasim_alloc_coherent+0x56/0x90 [vdpa_sim]
    ...

This happens because vdpasim->iommu[0] is not initialized when
dev_attr.nas is 0.

Let's fix this issue by initializing both (nas, ngroups) to 1 for
vdpa_sim_blk.

Solution

no-fix-redhat-rpm-package
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.