CVE-2022-50116
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's tty n_gsm driver involves a deadlock and link starvation issue in the outgoing data path. The problem arises because control and user packets are queued and processed together in a tightly coupled code path, which can cause deadlocks during data transmission, especially when the line discipline (ldisc) is congested. Additionally, data channels can starve the control channel under high transmission load. The fix introduces a separate control channel data queue with higher priority, processed before user data, and moves the queue processing into a workqueue to avoid locking issues and maintain performance.
How can this vulnerability impact me? :
This vulnerability can cause deadlocks and link hangups during data transmission in the Linux kernel's tty n_gsm driver, leading to potential system instability or communication failures. Under high data load, the control channel may be starved, causing timeouts and link hangups, which can disrupt normal operation of devices relying on this driver for GSM communication.