CVE-2022-50543

Source
https://cve.org/CVERecord?id=CVE-2022-50543
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50543.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50543
Downstream
Related
Published
2025-10-07T15:21:07.939Z
Modified
2026-03-20T12:22:35.608304Z
Summary
RDMA/rxe: Fix mr->map double free
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix mr->map double free

rxemrcleanup() which tries to free mr->map again will be called when rxemrinit_user() fails:

CPU: 0 PID: 4917 Comm: rdmaflushserv Kdump: loaded Not tainted 6.1.0-rc1-roce-flush+ #25 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 Call Trace: <TASK> dumpstacklvl+0x45/0x5d panic+0x19e/0x349 endreport.part.0+0x54/0x7c kasanreport.cold+0xa/0xf rxemrcleanup+0x9d/0xf0 [rdma_rxe] _rxecleanup+0x10a/0x1e0 [rdmarxe] rxeregusermr+0xb7/0xd0 [rdmarxe] ibuverbsregmr+0x26a/0x480 [ibuverbs] ibuverbshandlerUVERBSMETHODINVOKEWRITE+0x1a2/0x250 [ibuverbs] ibuverbscmdverbs+0x1397/0x15a0 [ibuverbs]

This issue was firstly exposed since commit b18c7da63fcb ("RDMA/rxe: Fix memory leak in error path code") and then we fixed it in commit 8ff5f5d9d8cf ("RDMA/rxe: Prevent double freeing rxemapset()") but this fix was reverted together at last by commit 1e75550648da (Revert "RDMA/rxe: Create duplicate mapping tables for FMRs")

Simply let rxemrcleanup() always handle freeing the mr->map once it is successfully allocated.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50543.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1e75550648da1fa1cd1969e7597355de8fe8caf6
Fixed
6ce577f09013206e36e674cd27da3707b2278268
Fixed
06f73568f553b5be6ba7f6fe274d333ea29fc46d
Fixed
7d984dac8f6bf4ebd3398af82b357e1d181ecaac
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
e004a35e8148ad9fc438b0479884641acf382896

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50543.json"