CVE-2022-50430
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's mmc vub300 driver where blocking operations were called when the current task was not in the TASK_RUNNING state. Specifically, the function vub300_enable_sdio_irq() works with a mutex and requires the current task to be marked as TASK_RUNNING to allow sleepable context. The issue was that blocking operations were being called without ensuring this state, which could cause warnings or improper behavior in the kernel scheduler.
How can this vulnerability impact me? :
The impact of this vulnerability could include kernel warnings and potential instability due to improper handling of blocking operations in the kernel driver. This could lead to unexpected behavior or crashes related to the SDIO IRQ handling in the vub300 driver, affecting system reliability.