{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-48850","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-16T11:38:08.912Z","datePublished":"2024-07-16T12:25:17.824Z","dateUpdated":"2025-12-23T13:20:56.947Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-12-23T13:20:56.947Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet-sysfs: add check for netdevice being present to speed_show\n\nWhen bringing down the netdevice or system shutdown, a panic can be\ntriggered while accessing the sysfs path because the device is already\nremoved.\n\n    [  755.549084] mlx5_core 0000:12:00.1: Shutdown was called\n    [  756.404455] mlx5_core 0000:12:00.0: Shutdown was called\n    ...\n    [  757.937260] BUG: unable to handle kernel NULL pointer dereference at           (null)\n    [  758.031397] IP: [<ffffffff8ee11acb>] dma_pool_alloc+0x1ab/0x280\n\n    crash> bt\n    ...\n    PID: 12649  TASK: ffff8924108f2100  CPU: 1   COMMAND: \"amsd\"\n    ...\n     #9 [ffff89240e1a38b0] page_fault at ffffffff8f38c778\n        [exception RIP: dma_pool_alloc+0x1ab]\n        RIP: ffffffff8ee11acb  RSP: ffff89240e1a3968  RFLAGS: 00010046\n        RAX: 0000000000000246  RBX: ffff89243d874100  RCX: 0000000000001000\n        RDX: 0000000000000000  RSI: 0000000000000246  RDI: ffff89243d874090\n        RBP: ffff89240e1a39c0   R8: 000000000001f080   R9: ffff8905ffc03c00\n        R10: ffffffffc04680d4  R11: ffffffff8edde9fd  R12: 00000000000080d0\n        R13: ffff89243d874090  R14: ffff89243d874080  R15: 0000000000000000\n        ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018\n    #10 [ffff89240e1a39c8] mlx5_alloc_cmd_msg at ffffffffc04680f3 [mlx5_core]\n    #11 [ffff89240e1a3a18] cmd_exec at ffffffffc046ad62 [mlx5_core]\n    #12 [ffff89240e1a3ab8] mlx5_cmd_exec at ffffffffc046b4fb [mlx5_core]\n    #13 [ffff89240e1a3ae8] mlx5_core_access_reg at ffffffffc0475434 [mlx5_core]\n    #14 [ffff89240e1a3b40] mlx5e_get_fec_caps at ffffffffc04a7348 [mlx5_core]\n    #15 [ffff89240e1a3bb0] get_fec_supported_advertised at ffffffffc04992bf [mlx5_core]\n    #16 [ffff89240e1a3c08] mlx5e_get_link_ksettings at ffffffffc049ab36 [mlx5_core]\n    #17 [ffff89240e1a3ce8] __ethtool_get_link_ksettings at ffffffff8f25db46\n    #18 [ffff89240e1a3d48] speed_show at ffffffff8f277208\n    #19 [ffff89240e1a3dd8] dev_attr_show at ffffffff8f0b70e3\n    #20 [ffff89240e1a3df8] sysfs_kf_seq_show at ffffffff8eedbedf\n    #21 [ffff89240e1a3e18] kernfs_seq_show at ffffffff8eeda596\n    #22 [ffff89240e1a3e28] seq_read at ffffffff8ee76d10\n    #23 [ffff89240e1a3e98] kernfs_fop_read at ffffffff8eedaef5\n    #24 [ffff89240e1a3ed8] vfs_read at ffffffff8ee4e3ff\n    #25 [ffff89240e1a3f08] sys_read at ffffffff8ee4f27f\n    #26 [ffff89240e1a3f50] system_call_fastpath at ffffffff8f395f92\n\n    crash> net_device.state ffff89443b0c0000\n      state = 0x5  (__LINK_STATE_START| __LINK_STATE_NOCARRIER)\n\nTo prevent this scenario, we also make sure that the netdevice is present."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/core/net-sysfs.c"],"versions":[{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"a7b9ab04c5932dee7ec95e0abc58b0df350c0dd2","status":"affected","versionType":"git"},{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"081369ad088a76429984483b8a5f7e967a125aad","status":"affected","versionType":"git"},{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"75fc8363227a999e8f3d17e2eb28dce5600dcd3f","status":"affected","versionType":"git"},{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"8879b5313e9fa5e0c6d6812a0d25d83aed0110e2","status":"affected","versionType":"git"},{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"d15c9f6e3335002fea1c33bc8f71a705fa96976c","status":"affected","versionType":"git"},{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"8d5e69d8fbf3a35ab4fbe56b8f092802b43f3ef6","status":"affected","versionType":"git"},{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"3a79f380b3e10edf6caa9aac90163a5d7a282204","status":"affected","versionType":"git"},{"version":"d519e17e2d01a0ee9abe083019532061b4438065","lessThan":"4224cfd7fb6523f7a9d1c8bb91bb5df1e38eb624","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/core/net-sysfs.c"],"versions":[{"version":"2.6.33","status":"affected"},{"version":"0","lessThan":"2.6.33","status":"unaffected","versionType":"semver"},{"version":"4.9.307","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.272","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.235","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.185","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.106","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.29","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"5.16.15","lessThanOrEqual":"5.16.*","status":"unaffected","versionType":"semver"},{"version":"5.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"4.9.307"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"4.14.272"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"4.19.235"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"5.4.185"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"5.10.106"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"5.15.29"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"5.16.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.33","versionEndExcluding":"5.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a7b9ab04c5932dee7ec95e0abc58b0df350c0dd2"},{"url":"https://git.kernel.org/stable/c/081369ad088a76429984483b8a5f7e967a125aad"},{"url":"https://git.kernel.org/stable/c/75fc8363227a999e8f3d17e2eb28dce5600dcd3f"},{"url":"https://git.kernel.org/stable/c/8879b5313e9fa5e0c6d6812a0d25d83aed0110e2"},{"url":"https://git.kernel.org/stable/c/d15c9f6e3335002fea1c33bc8f71a705fa96976c"},{"url":"https://git.kernel.org/stable/c/8d5e69d8fbf3a35ab4fbe56b8f092802b43f3ef6"},{"url":"https://git.kernel.org/stable/c/3a79f380b3e10edf6caa9aac90163a5d7a282204"},{"url":"https://git.kernel.org/stable/c/4224cfd7fb6523f7a9d1c8bb91bb5df1e38eb624"}],"title":"net-sysfs: add check for netdevice being present to speed_show","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T15:25:01.618Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/a7b9ab04c5932dee7ec95e0abc58b0df350c0dd2","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/081369ad088a76429984483b8a5f7e967a125aad","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/75fc8363227a999e8f3d17e2eb28dce5600dcd3f","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8879b5313e9fa5e0c6d6812a0d25d83aed0110e2","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/d15c9f6e3335002fea1c33bc8f71a705fa96976c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/8d5e69d8fbf3a35ab4fbe56b8f092802b43f3ef6","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/3a79f380b3e10edf6caa9aac90163a5d7a282204","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/4224cfd7fb6523f7a9d1c8bb91bb5df1e38eb624","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2022-48850","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:56:25.657269Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:34:08.652Z"}}]}}