CVE-2022-49089

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
26/02/2025
Last modified:
23/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition<br /> <br /> The documentation of the function rvt_error_qp says both r_lock and s_lock<br /> need to be held when calling that function. It also asserts using lockdep<br /> that both of those locks are held. However, the commit I referenced in<br /> Fixes accidentally makes the call to rvt_error_qp in rvt_ruc_loopback no<br /> longer covered by r_lock. This results in the lockdep assertion failing<br /> and also possibly in a race condition.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.0.4 (including) 5.4.189 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.111 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.34 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.16.20 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.17 (including) 5.17.3 (excluding)
cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*