CVE-2022-49606

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
26/02/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/irdma: Fix sleep from invalid context BUG<br /> <br /> Taking the qos_mutex to process RoCEv2 QP&amp;#39;s on netdev events causes a<br /> kernel splat.<br /> <br /> Fix this by removing the handling for RoCEv2 in<br /> irdma_cm_teardown_connections that uses the mutex. This handling is only<br /> needed for iWARP to avoid having connections established while the link is<br /> down or having connections remain functional after the IP address is<br /> removed.<br /> <br /> BUG: sleeping function called from invalid context at kernel/locking/mutex.<br /> Call Trace:<br /> kernel: dump_stack+0x66/0x90<br /> kernel: ___might_sleep.cold.92+0x8d/0x9a<br /> kernel: mutex_lock+0x1c/0x40<br /> kernel: irdma_cm_teardown_connections+0x28e/0x4d0 [irdma]<br /> kernel: ? check_preempt_curr+0x7a/0x90<br /> kernel: ? select_idle_sibling+0x22/0x3c0<br /> kernel: ? select_task_rq_fair+0x94c/0xc90<br /> kernel: ? irdma_exec_cqp_cmd+0xc27/0x17c0 [irdma]<br /> kernel: ? __wake_up_common+0x7a/0x190<br /> kernel: irdma_if_notify+0x3cc/0x450 [irdma]<br /> kernel: ? sched_clock_cpu+0xc/0xb0<br /> kernel: irdma_inet6addr_event+0xc6/0x150 [irdma]

Impact