CVE-2022-50086
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's block layer where the same type of request queue quality of service (rq_qos) can be added more than once to a disk queue when two CPUs write concurrently to the io.cost.qos file. This causes two instances of ioc (io cost structures) to be enabled on one disk, each owning different iocgs (io cost groups) on their active list. Because these iocgs share the same root iocg, their walk_list can be overwritten by each other, leading to list add/delete corruptions in the inner_walk list during timer function execution. The vulnerability can cause system instability or crashes due to corrupted data structures managing IO scheduling.
How can this vulnerability impact me? :
This vulnerability can lead to list corruption in the Linux kernel's IO scheduling subsystem, potentially causing system crashes or instability. If exploited or triggered, it may disrupt disk IO operations, degrade system performance, or cause kernel panics, affecting the reliability and availability of systems running vulnerable Linux kernel versions.