4.7
CVE-2022-49089
- EPSS 0.02%
- Published 26.02.2025 07:00:46
- Last modified 23.09.2025 18:11:30
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Open
In the Linux kernel, the following vulnerability has been resolved: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition The documentation of the function rvt_error_qp says both r_lock and s_lock need to be held when calling that function. It also asserts using lockdep that both of those locks are held. However, the commit I referenced in Fixes accidentally makes the call to rvt_error_qp in rvt_ruc_loopback no longer covered by r_lock. This results in the lockdep assertion failing and also possibly in a race condition.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 5.0.4 < 5.4.189
Linux ≫ Linux Kernel Version >= 5.5 < 5.10.111
Linux ≫ Linux Kernel Version >= 5.11 < 5.15.34
Linux ≫ Linux Kernel Version >= 5.16 < 5.16.20
Linux ≫ Linux Kernel Version >= 5.17 < 5.17.3
Linux ≫ Linux Kernel Version5.18 Updaterc1
| Type | Source | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.05 |
| Source | Base Score | Exploit Score | Impact Score | Vector string |
|---|---|---|---|---|
| nvd@nist.gov | 4.7 | 1 | 3.6 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
CWE-667 Improper Locking
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.