{"id":"CVE-2022-50137","summary":"RDMA/irdma: Fix a window for use-after-free","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a window for use-after-free\n\nDuring a destroy CQ an interrupt may cause processing of a CQE after CQ\nresources are freed by irdma_cq_free_rsrc(). Fix this by moving the call\nto irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is\ncalled under the cq_lock.","modified":"2026-04-11T12:44:54.711859Z","published":"2025-06-18T11:03:00.899Z","related":["SUSE-SU-2025:02264-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02537-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50137.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0abf2eef80295923b819ce89ff9edc1fe61be17c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/350ac793a03c8a30a3f2b27fc282cd1c67070763"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ecef7890b3aea78c8bbb501a4b5b8134367b821"},{"type":"WEB","url":"https://git.kernel.org/stable/c/92520864ef9f912f38b403d172a0ded020683d55"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50137.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50137"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b48c24c2d710cf34810c555dcef883a3d35a9c08"},{"fixed":"92520864ef9f912f38b403d172a0ded020683d55"},{"fixed":"0abf2eef80295923b819ce89ff9edc1fe61be17c"},{"fixed":"350ac793a03c8a30a3f2b27fc282cd1c67070763"},{"fixed":"8ecef7890b3aea78c8bbb501a4b5b8134367b821"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50137.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.14.0"},{"fixed":"5.15.61"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"5.18.18"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.19.0"},{"fixed":"5.19.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50137.json"}}],"schema_version":"1.7.5"}