CVE-2022-50100
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a scheduling issue where a task is requeued on a CPU that it is not allowed to run on. Specifically, an optimization in the scheduler's ttwu() function queues a task that is descheduling on the wakelist without verifying if the task can still run on that CPU. This can cause warnings and improper task handling, especially on large machines during early boot or under certain conditions involving workqueue rescue threads and parallel wakeups from other CPUs.
How can this vulnerability impact me? :
The vulnerability can lead to warnings and potential instability in the Linux kernel's task scheduling, particularly on large machines. Tasks may be incorrectly queued on CPUs they are not allowed to run on, which could cause performance issues or unexpected behavior during system boot or under heavy load involving workqueue rescue threads.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel warning related to CPU task requeueing, specifically a warning message like: "WARNING: CPU: <cpu_id> PID: <pid> at ../kernel/workqueue.c:2231 process_one_work+0x4d/0x440" during early boot or under load on large machines. Detection involves monitoring kernel logs (e.g., using 'dmesg' or 'journalctl -k') for such warnings. Example commands: 'dmesg | grep "WARNING: CPU"' or 'journalctl -k | grep "process_one_work"'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this issue, which ensures that tasks are not requeued on CPUs excluded from their allowed CPU mask. Until an update is applied, monitoring for the warning messages and avoiding workloads that trigger frequent rescue thread usage on large machines may reduce exposure.