CVE-2022-50136

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-50136
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50136.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50136
Downstream
Related
Published
2025-06-18T11:15:43Z
Modified
2025-08-09T19:01:27Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix duplicated reported IWCMEVENTCONNECTREPLY event

If siwrecvmparr returns -EAGAIN, it means that the MPA reply hasn't been received completely, and should not report IWCMEVENTCONNECTREPLY in this case. This may trigger a call trace in iwcm. A simple way to trigger this: server: ibsendlat client: ibsendlat -R <server_ip>

The call trace looks like this:

kernel BUG at drivers/infiniband/core/iwcm.c:894! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI <...> Workqueue: iwcmwq cmworkhandler [iwcm] Call Trace: <TASK> cmworkhandler+0x1dd/0x370 [iwcm] processonework+0x1e2/0x3b0 workerthread+0x49/0x2e0 ? rescuerthread+0x370/0x370 kthread+0xe5/0x110 ? kthreadcompleteandexit+0x20/0x20 retfrom_fork+0x1f/0x30 </TASK>

References

Affected packages