Oops: 0002 [#1] SMP PTI with kernel mode access
CVE-2022-48673
What is CVE-2022-48673?
A vulnerability has been identified in the Linux kernel concerning the Socket Memory Channel (SMC). This issue arises when modifying the Queue Pair (QP) to the Error state. Upon modification, all Receive Work Requests (RX WR) are completed with a status of IB_WC_WR_FLUSH_ERR, but the current implementation fails to wait for this process to finish. Instead, it directly destroys the QP and frees the link group, leading to potential access to freed memory during tasklet execution. Such memory access can result in system instability, including page faults and crashes, highlighting the critical need for proper handling in the kernel code.
Affected Version(s)
Linux bd4ad57718cc86d2972a20f9791cd079996a4dd6 < 89fcb70f1acd6b0bbf2f7bfbf45d7aa75a9bdcde
Linux bd4ad57718cc86d2972a20f9791cd079996a4dd6
Linux 4.11