CVE-2022-50217
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's FUSE subsystem involves a race condition between write(2) and close(2) system calls. It allows pages to be dirtied after the fuse_flush function calls write_inode_now(). If these dirty pages are not flushed during fuse_release(), there may not be a writable open file later. Essentially, any remaining dirty pages must be written back before the file is released to avoid potential data integrity issues.
How can this vulnerability impact me? :
The vulnerability can lead to data integrity problems where changes to files might not be properly saved if dirty pages are not flushed before the file is closed. This could result in data loss or corruption when using FUSE filesystems under certain race conditions.