CVE-2022-50103
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's scheduler and cpuset code where, with cgroup v2, the cpuset's cpus_allowed mask can be empty. This causes a function to incorrectly handle CPU masks, leading to an out-of-bounds access and a kernel panic (crash). The issue arises because the code uses cpus_allowed directly instead of the effective CPU mask, which can be empty in cgroup v2, causing a crash when accessing CPU-specific data. The fix involves using the effective CPU mask and adding checks to prevent out-of-bound CPU accesses.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (panic) when handling certain cpuset configurations under cgroup v2. This can lead to system instability, unexpected downtime, and potential loss of service or data availability.
What immediate steps should I take to mitigate this vulnerability?
Apply the Linux kernel update that includes the fix for this vulnerability, which replaces the use of cpus_allowed with effective_cpus in the cpuset code and adds necessary checks to prevent crashes. Until the patch is applied, avoid using cgroup v2 cpusets with empty cpus_allowed masks to prevent triggering the issue.