We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50137

RDMA/irdma: Fix a window for use-after-free



Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix a window for use-after-free During a destroy CQ an interrupt may cause processing of a CQE after CQ resources are freed by irdma_cq_free_rsrc(). Fix this by moving the call to irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is called under the cq_lock.

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

b48c24c2d710cf34810c555dcef883a3d35a9c08 before 92520864ef9f912f38b403d172a0ded020683d55
affected

b48c24c2d710cf34810c555dcef883a3d35a9c08 before 0abf2eef80295923b819ce89ff9edc1fe61be17c
affected

b48c24c2d710cf34810c555dcef883a3d35a9c08 before 350ac793a03c8a30a3f2b27fc282cd1c67070763
affected

b48c24c2d710cf34810c555dcef883a3d35a9c08 before 8ecef7890b3aea78c8bbb501a4b5b8134367b821
affected

Default status
affected

5.14
affected

Any version before 5.14
unaffected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/92520864ef9f912f38b403d172a0ded020683d55

git.kernel.org/...c/0abf2eef80295923b819ce89ff9edc1fe61be17c

git.kernel.org/...c/350ac793a03c8a30a3f2b27fc282cd1c67070763

git.kernel.org/...c/8ecef7890b3aea78c8bbb501a4b5b8134367b821

cve.org (CVE-2022-50137)

nvd.nist.gov (CVE-2022-50137)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50137

Support options

Helpdesk Chat, Email, Knowledgebase