CVE-2022-50137

Source
https://cve.org/CVERecord?id=CVE-2022-50137
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50137.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50137
Downstream
Related
Published
2025-06-18T11:03:00.899Z
Modified
2026-03-12T03:26:13.132786Z
Summary
RDMA/irdma: Fix a window for use-after-free
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix a window for use-after-free

During a destroy CQ an interrupt may cause processing of a CQE after CQ resources are freed by irdmacqfreersrc(). Fix this by moving the call to irdmacqfreersrc() after the irdmasccleanupceqes(), which is called under the cqlock.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50137.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b48c24c2d710cf34810c555dcef883a3d35a9c08
Fixed
92520864ef9f912f38b403d172a0ded020683d55
Fixed
0abf2eef80295923b819ce89ff9edc1fe61be17c
Fixed
350ac793a03c8a30a3f2b27fc282cd1c67070763
Fixed
8ecef7890b3aea78c8bbb501a4b5b8134367b821

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50137.json"