-

CVE-2022-50136

In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event

If siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn't
been received completely, and should not report IW_CM_EVENT_CONNECT_REPLY
in this case. This may trigger a call trace in iw_cm. A simple way to
trigger this:
 server: ib_send_lat
 client: ib_send_lat -R <server_ip>

The call trace looks like this:

 kernel BUG at drivers/infiniband/core/iwcm.c:894!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 <...>
 Workqueue: iw_cm_wq cm_work_handler [iw_cm]
 Call Trace:
  <TASK>
  cm_work_handler+0x1dd/0x370 [iw_cm]
  process_one_work+0x1e2/0x3b0
  worker_thread+0x49/0x2e0
  ? rescuer_thread+0x370/0x370
  kthread+0xe5/0x110
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x1f/0x30
  </TASK>

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 11edf0bba15ea9df49478affec7974f351bb2f6e
Version 6c52fdc244b5ccc468006fd65a504d4ee33743c7
Status affected
Version < 9ade92ddaf2347fb34298c02080caaa3cdd7c27b
Version 6c52fdc244b5ccc468006fd65a504d4ee33743c7
Status affected
Version < f6e26e1a5f600b760dc32135d3fac846eabe09e7
Version 6c52fdc244b5ccc468006fd65a504d4ee33743c7
Status affected
Version < 0066246d2d7e2619f3ecf3cf07333c59e6e7d84d
Version 6c52fdc244b5ccc468006fd65a504d4ee33743c7
Status affected
Version < 1434de50a5d9dab91c8ce031bc23b3e2178379c5
Version 6c52fdc244b5ccc468006fd65a504d4ee33743c7
Status affected
Version < 3056fc6c32e613b760422b94c7617ac9a24a4721
Version 6c52fdc244b5ccc468006fd65a504d4ee33743c7
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.3
Status affected
Version < 5.3
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.211
Status unaffected
Version <= 5.10.*
Version 5.10.137
Status unaffected
Version <= 5.15.*
Version 5.15.61
Status unaffected
Version <= 5.18.*
Version 5.18.18
Status unaffected
Version <= 5.19.*
Version 5.19.2
Status unaffected
Version <= *
Version 6.0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.094
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string