CVE-2022-50472

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
23/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> IB/mad: Don&amp;#39;t call to function that might sleep while in atomic context<br /> <br /> Tracepoints are not allowed to sleep, as such the following splat is<br /> generated due to call to ib_query_pkey() in atomic context.<br /> <br /> WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220<br /> CPU: 0 PID: 1888000 Comm: kworker/u9:0 Kdump: loaded Tainted: G OE --------- - - 4.18.0-305.3.1.el8.x86_64 #1<br /> Hardware name: Red Hat KVM, BIOS 1.13.0-2.module_el8.3.0+555+a55c8938 04/01/2014<br /> Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core]<br /> RIP: 0010:rb_commit+0xc1/0x220<br /> RSP: 0000:ffffa8ac80f9bca0 EFLAGS: 00010202<br /> RAX: ffff8951c7c01300 RBX: ffff8951c7c14a00 RCX: 0000000000000246<br /> RDX: ffff8951c707c000 RSI: ffff8951c707c57c RDI: ffff8951c7c14a00<br /> RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000<br /> R10: ffff8951c7c01300 R11: 0000000000000001 R12: 0000000000000246<br /> R13: 0000000000000000 R14: ffffffff964c70c0 R15: 0000000000000000<br /> FS: 0000000000000000(0000) GS:ffff8951fbc00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007f20e8f39010 CR3: 000000002ca10005 CR4: 0000000000170ef0<br /> Call Trace:<br /> ring_buffer_unlock_commit+0x1d/0xa0<br /> trace_buffer_unlock_commit_regs+0x3b/0x1b0<br /> trace_event_buffer_commit+0x67/0x1d0<br /> trace_event_raw_event_ib_mad_recv_done_handler+0x11c/0x160 [ib_core]<br /> ib_mad_recv_done+0x48b/0xc10 [ib_core]<br /> ? trace_event_raw_event_cq_poll+0x6f/0xb0 [ib_core]<br /> __ib_process_cq+0x91/0x1c0 [ib_core]<br /> ib_cq_poll_work+0x26/0x80 [ib_core]<br /> process_one_work+0x1a7/0x360<br /> ? create_worker+0x1a0/0x1a0<br /> worker_thread+0x30/0x390<br /> ? create_worker+0x1a0/0x1a0<br /> kthread+0x116/0x130<br /> ? kthread_flush_work_fn+0x10/0x10<br /> ret_from_fork+0x35/0x40<br /> ---[ end trace 78ba8509d3830a16 ]---

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.2 (including) 5.15.86 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.0.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1 (including) 6.1.2 (excluding)