CVE-2022-49998
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves bugs in the Linux kernel's rxrpc protocol implementation, specifically in the sendmsg function. The issues relate to improper locking and unlocking of mutexes during message sending, which can lead to bad unlock balance errors and potential race conditions when multiple sendmsg calls occur simultaneously. The fixes address releasing socket locks correctly on errors, ensuring mutexes are held properly even when interrupted by signals, and rechecking buffer states after mutex operations to prevent inconsistent states.
How can this vulnerability impact me? :
The vulnerability can cause kernel warnings and errors related to improper lock handling, which may lead to instability or crashes in the kernel's rxrpc communication. This could affect applications relying on rxrpc for communication by causing unexpected behavior or denial of service due to kernel-level locking issues.