CVE-2022-50736
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2025
Last modified:
24/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/siw: Fix immediate work request flush to completion queue<br />
<br />
Correctly set send queue element opcode during immediate work request<br />
flushing in post sendqueue operation, if the QP is in ERROR state.<br />
An undefined ocode value results in out-of-bounds access to an array<br />
for mapping the opcode between siw internal and RDMA core representation<br />
in work completion generation. It resulted in a KASAN BUG report<br />
of type &#39;global-out-of-bounds&#39; during NFSoRDMA testing.<br />
<br />
This patch further fixes a potential case of a malicious user which may<br />
write undefined values for completion queue elements status or opcode,<br />
if the CQ is memory mapped to user land. It avoids the same out-of-bounds<br />
access to arrays for status and opcode mapping as described above.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/355d2eca68c10d713a42f68e62044b3d1c300471
- https://git.kernel.org/stable/c/6af043089d3f1210776d19b6fdabea610d4c7699
- https://git.kernel.org/stable/c/75af03fdf35acf15a3977f7115f6b8d10dff4bc7
- https://git.kernel.org/stable/c/bdf1da5df9da680589a7f74448dd0a94dd3e1446
- https://git.kernel.org/stable/c/f3d26a8589dfdeff328779b511f71fb90b10005e
- https://git.kernel.org/stable/c/f8d8fbd3b6d6cc3f25790cca5cffe8ded512fef6



