CVE-2022-50472
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 4.18.0-305.3.1.el8 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's IB/mad component where a function that might cause the system to sleep is called while in an atomic context. Atomic context means that sleeping is not allowed, and calling such a function leads to a kernel warning and potential system instability or crash. Specifically, the call to ib_query_pkey() in atomic context causes a tracepoint to sleep, which is not permitted.
How can this vulnerability impact me? :
The impact of this vulnerability is that it can cause the Linux kernel to generate warnings and potentially crash or become unstable due to improper sleeping in atomic context. This can affect system reliability and availability, especially in environments using the affected IB/mad kernel component.