CVE-2022-50736Out-of-bounds Read in Linux

CWE-125Out-of-bounds Read7 documents6 sources
Severity
5.0MEDIUM
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix immediate work request flush to completion queue Correctly set send queue element opcode during immediate work request flushing in post sendqueue operation, if the QP is in ERROR state. An undefined ocode value results in out-of-bounds access to an array for mapping the opcode between siw internal and RDMA core representation in work completion generation. It resulted in a KASAN BUG report of type 'global-out-of-

Affected Packages4 packages

Linuxlinux/linux_kernel5.3.05.4.229+4
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linux303ae1cdfdf7280ff4cfbbe65563b5ff15bb025b6af043089d3f1210776d19b6fdabea610d4c7699+6
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2022-50736: In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix immediate work request flush to completion queue Correctly set send2025-12-24
OSV
RDMA/siw: Fix immediate work request flush to completion queue2025-12-24
GHSA
GHSA-p4wh-wgxj-q3c5: In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix immediate work request flush to completion queue Correctly set sen2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel: Privilege escalation via out-of-bounds write in RDMA/siw2025-12-24
Debian
CVE-2022-50736: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: F...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50736 Impact, Exploitability, and Mitigation Steps | Wiz