CVE-2022-50666 — Use After Free in Linux
Severity
5.9MEDIUM
No vectorEPSS
0.0%
top 90.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: Fix QP destroy to wait for all references dropped.
Delay QP destroy completion until all siw references to QP are
dropped. The calling RDMA core will free QP structure after
successful return from siw_qp_destroy() call, so siw must not
hold any remaining reference to the QP upon return.
A use-after-free was encountered in xfstest generic/460, while
testing NFSoRDMA. Here, after a TCP connection drop by peer,
the trig…
Affected Packages4 packages
▶CVEListV5linux/linux303ae1cdfdf7280ff4cfbbe65563b5ff15bb025b — 5c75d608fad58301b63e7d69200c13c3a1d411da+4
🔴Vulnerability Details
3GHSA▶
GHSA-mppj-wh3r-grwx: In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: Fix QP destroy to wait for all references dropped↗2025-12-09
OSV▶
CVE-2022-50666: In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix QP destroy to wait for all references dropped↗2025-12-09