CVE-2022-50736 — Out-of-bounds Read in Linux
Severity
5.0MEDIUM
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: Fix immediate work request flush to completion queue
Correctly set send queue element opcode during immediate work request
flushing in post sendqueue operation, if the QP is in ERROR state.
An undefined ocode value results in out-of-bounds access to an array
for mapping the opcode between siw internal and RDMA core representation
in work completion generation. It resulted in a KASAN BUG report
of type 'global-out-of-…
Affected Packages4 packages
▶CVEListV5linux/linux303ae1cdfdf7280ff4cfbbe65563b5ff15bb025b — 6af043089d3f1210776d19b6fdabea610d4c7699+6
🔴Vulnerability Details
3OSV▶
CVE-2022-50736: In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix immediate work request flush to completion queue Correctly set send↗2025-12-24
GHSA▶
GHSA-p4wh-wgxj-q3c5: In the Linux kernel, the following vulnerability has been resolved:
RDMA/siw: Fix immediate work request flush to completion queue
Correctly set sen↗2025-12-24