CVE-2022-50202
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a race condition and potential deadlock during device probing when resuming from hibernation. Specifically, a variable called probe_count, which tracks ongoing device probes, may never reach zero due to certain conditions, causing the system to hang. One key scenario is when a process emulating a USB device via the /dev/raw-gadget interface stops responding, leading to a deadlock where the system waits indefinitely for device probes to complete while holding critical mutexes. The patch defers waiting for device probes to later stages to mitigate this issue, but some risk remains if the emulating process is blocked.
How can this vulnerability impact me? :
This vulnerability can cause the system to hang indefinitely during resume from hibernation if a device probe does not complete, particularly when a USB device emulation process becomes unresponsive. This can lead to system instability, inability to resume properly, and potential denial of service conditions.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the patch that defers wait_for_device_probe() from snapshot_open() to snapshot_write() and snapshot_ioctl(), which reduces the risk of the deadlock caused by processes emulating USB devices via /dev/raw-gadget interface. Additionally, avoid running processes that emulate USB devices using /dev/raw-gadget interface that may block on uninterruptible operations such as mutex_lock(). Note that other cases (a) and (c) are not addressed by this patch, so monitoring and managing device probe requests and hardware responsiveness is also advisable.