CVE-2022-50426
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's remoteproc imx_dsp_rproc component involves a lack of proper mutex protection for a workqueue. The workqueue may execute after the remote processor has been stopped or is stopping, during which some resources have already been released. If the workqueue accesses these released resources, it can cause a kernel crash (kernel dump). The fix adds mutex protection to prevent the workqueue from running when the remote processor is not in a running state, avoiding unsafe access to released resources.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (kernel dump) on affected Linux systems using the imx_dsp_rproc remote processor driver. Such crashes can lead to system instability, unexpected reboots, or denial of service, potentially disrupting normal operations and affecting system reliability.