CVE-2022-49606
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
23/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/irdma: Fix sleep from invalid context BUG<br />
<br />
Taking the qos_mutex to process RoCEv2 QP&#39;s on netdev events causes a<br />
kernel splat.<br />
<br />
Fix this by removing the handling for RoCEv2 in<br />
irdma_cm_teardown_connections that uses the mutex. This handling is only<br />
needed for iWARP to avoid having connections established while the link is<br />
down or having connections remain functional after the IP address is<br />
removed.<br />
<br />
BUG: sleeping function called from invalid context at kernel/locking/mutex.<br />
Call Trace:<br />
kernel: dump_stack+0x66/0x90<br />
kernel: ___might_sleep.cold.92+0x8d/0x9a<br />
kernel: mutex_lock+0x1c/0x40<br />
kernel: irdma_cm_teardown_connections+0x28e/0x4d0 [irdma]<br />
kernel: ? check_preempt_curr+0x7a/0x90<br />
kernel: ? select_idle_sibling+0x22/0x3c0<br />
kernel: ? select_task_rq_fair+0x94c/0xc90<br />
kernel: ? irdma_exec_cqp_cmd+0xc27/0x17c0 [irdma]<br />
kernel: ? __wake_up_common+0x7a/0x190<br />
kernel: irdma_if_notify+0x3cc/0x450 [irdma]<br />
kernel: ? sched_clock_cpu+0xc/0xb0<br />
kernel: irdma_inet6addr_event+0xc6/0x150 [irdma]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.58 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



