CVE-2022-50225
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's riscv architecture implementation related to uprobe handling. The issue occurs because the process of clearing and setting the spie (Supervisor Previous Interrupt Enable) flag before and after executing the original instruction can cause a page fault while interrupts are disabled. This leads to a kernel warning (WARN) and potentially unstable behavior. The fix removes the unnecessary clearing and setting of spie in the arch_uprobe_pre/post/abort_xol functions.
How can this vulnerability impact me? :
This vulnerability can cause kernel warnings and potentially unstable or unexpected behavior in the Linux kernel on riscv systems when uprobe triggers a page fault with interrupts disabled. This may affect system stability or reliability during debugging or tracing operations that use uprobes.