| Name | CVE-2022-50136 | 
| Description | In the Linux kernel, the following vulnerability has been resolved:  RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event  If siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn't been received completely, and should not report IW_CM_EVENT_CONNECT_REPLY in this case. This may trigger a call trace in iw_cm. A simple way to trigger this:  server: ib_send_lat  client: ib_send_lat -R <server_ip>  The call trace looks like this:   kernel BUG at drivers/infiniband/core/iwcm.c:894!  invalid opcode: 0000 [#1] PREEMPT SMP NOPTI  <...>  Workqueue: iw_cm_wq cm_work_handler [iw_cm]  Call Trace:   <TASK>   cm_work_handler+0x1dd/0x370 [iw_cm]   process_one_work+0x1e2/0x3b0   worker_thread+0x49/0x2e0   ? rescuer_thread+0x370/0x370   kthread+0xe5/0x110   ? kthread_complete_and_exit+0x20/0x20   ret_from_fork+0x1f/0x30   </TASK> | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
The table below lists information on source packages.
The information below is based on the following data on fixed versions.