CVE-2022-50666

Source
https://cve.org/CVERecord?id=CVE-2022-50666
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50666.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50666
Downstream
Related
Published
2025-12-09T01:29:16.813Z
Modified
2026-04-02T08:28:41.924286Z
Summary
RDMA/siw: Fix QP destroy to wait for all references dropped.
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix QP destroy to wait for all references dropped.

Delay QP destroy completion until all siw references to QP are dropped. The calling RDMA core will free QP structure after successful return from siwqpdestroy() call, so siw must not hold any remaining reference to the QP upon return. A use-after-free was encountered in xfstest generic/460, while testing NFSoRDMA. Here, after a TCP connection drop by peer, the triggered siwcmwork_handler got delayed until after QP destroy call, referencing a QP which has already freed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50666.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
303ae1cdfdf7280ff4cfbbe65563b5ff15bb025b
Fixed
5c75d608fad58301b63e7d69200c13c3a1d411da
Fixed
74ad141e995a730760b1bcfa14854b7f1057d6bc
Fixed
0ed8bf9d0bb19f3f5eedd73f04aaf5bba9ac0737
Fixed
a3c278807a459e6f50afee6971cabe74cccfb490

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50666.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.3.0
Fixed
5.15.75
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.17
Type
ECOSYSTEM
Events
Introduced
5.20.0
Fixed
6.0.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50666.json"