-

CVE-2022-50671

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix "kernel NULL pointer dereference" error

When rxe_queue_init in the function rxe_qp_init_req fails,
both qp->req.task.func and qp->req.task.arg are not initialized.

Because of creation of qp fails, the function rxe_create_qp will
call rxe_qp_do_cleanup to handle allocated resource.

Before calling __rxe_do_task, both qp->req.task.func and
qp->req.task.arg should be checked.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 48cd7098e71735ccafa0b3cf27c53924f9cb5b2f
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < eca119693010032d6cc6e7e9b4fb2c363c7e12ce
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < 9c5dd6993c794703e74c6ba17ac78ca0211ef940
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < 0d773c58d702f0a7c16ee8d69617fd2c28350795
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < cdce36a88def550773142a34ef727a830cad96a8
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < f2f405af70e6f0419e718d23fa304798a5405c41
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < bb33fa65da77f5f02dbee6f25cebaeedfcd70028
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < 3b8752f086eb6865cc3662ad13249b03024501e5
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
Version < a625ca30eff806395175ebad3ac1399014bdb280
Version 8700e3e7c4857d28ebaa824509934556da0b3e76
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.8
Status affected
Version < 4.8
Version 0
Status unaffected
Version <= 4.9.*
Version 4.9.331
Status unaffected
Version <= 4.14.*
Version 4.14.296
Status unaffected
Version <= 4.19.*
Version 4.19.262
Status unaffected
Version <= 5.4.*
Version 5.4.220
Status unaffected
Version <= 5.10.*
Version 5.10.150
Status unaffected
Version <= 5.15.*
Version 5.15.75
Status unaffected
Version <= 5.19.*
Version 5.19.17
Status unaffected
Version <= 6.0.*
Version 6.0.3
Status unaffected
Version <= *
Version 6.1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.091
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String