In the Linux kernel, the following vulnerability has been resolved:
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
The documentation of the function rvt_error_qp says both r_lock and s_lock
need to be held when calling that function. It also asserts using lockdep
that both of those locks are held. However, the commit I referenced in
Fixes accidentally makes the call to rvt_error_qp in rvt_ruc_loopback no
longer covered by r_lock. This results in the lockdep assertion failing
and also possibly in a race condition.
Metrics
Affected Vendors & Products
References
History
Thu, 27 Feb 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 26 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition The documentation of the function rvt_error_qp says both r_lock and s_lock need to be held when calling that function. It also asserts using lockdep that both of those locks are held. However, the commit I referenced in Fixes accidentally makes the call to rvt_error_qp in rvt_ruc_loopback no longer covered by r_lock. This results in the lockdep assertion failing and also possibly in a race condition. | |
Title | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-02-26T01:54:45.743Z
Updated: 2025-05-04T12:44:16.832Z
Reserved: 2025-02-26T01:49:39.248Z
Link: CVE-2022-49089

No data.

Status : Received
Published: 2025-02-26T07:00:46.240
Modified: 2025-02-26T07:00:46.240
Link: CVE-2022-49089
