CVE-2022-50382
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.8 (inc) to 5.10.163 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.86 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.0.16 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deadlock issue in the Linux kernel's padata subsystem. It occurs when the system is overloaded and runs the ->parallel() function in the context of the current task. The problem arises because bottom halves (BHs) are not disabled during the execution of padata_do_serial, which leads to a deadlock when an interrupt triggers another call to padata_do_serial trying to acquire the same lock. The fix ensures that BHs are disabled in the current task case, preventing this deadlock.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to deadlock under heavy load conditions when running certain parallel processing tasks. This deadlock can lead to system hangs or freezes, impacting system stability and availability.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by ensuring that bottom halves (BHs) are disabled when running the ->parallel() function in the Linux kernel's padata subsystem. To mitigate this vulnerability, update your Linux kernel to a version that includes this fix where BHs are properly disabled in the current task context during parallel execution. There are no specific immediate configuration changes or commands provided to mitigate this issue without updating the kernel.