CVE-2022-50044
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's net: qrtr component involves race conditions caused by the MHI channel generating events or interrupts immediately after enabling. Specifically, events may be dropped or cause a kernel panic because certain device data or endpoints are not yet properly initialized when the events occur. This happens due to timing issues between setting driver data and registering endpoints, leading to failures in service enumeration or kernel crashes.
How can this vulnerability impact me? :
The vulnerability can cause the kernel to panic due to accessing invalid pointers, leading to system crashes. Additionally, it can prevent the qrtr-ns from enumerating services on the device, potentially disrupting communication or functionality relying on these services.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version where the fix has been applied. The fix involves moving mhi_prepare_for_transfer_autoqueue after endpoint creation to prevent race conditions that can cause kernel panic or service enumeration failure.