CVE-2022-50517
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | From 5.19.1 (inc) to 6.0.7 (inc) |
| linux | linux_kernel | 6.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's memory management, specifically in the handling of Transparent Huge Pages (THP) during a split operation. A patch intended to clear certain page private data during THP splitting did not correctly handle the 'swp_entry_t' data stored in tail pages, which can lead to inconsistent or unexpected values in page private data. This inconsistency can cause system instability such as soft lockups or crashes when running memory stress tests like stress-ng mmap.
How can this vulnerability impact me? :
The vulnerability can cause system instability, including soft lockups where the CPU becomes stuck for extended periods, potentially leading to crashes or degraded system performance. This can affect systems running workloads that heavily use memory management features like Transparent Huge Pages, especially under stress testing or high memory pressure scenarios.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing system behavior such as soft lockups or kernel crashes when running stress tests like stress-ng with mmap workload. Specifically, look for kernel BUG messages related to soft lockups (e.g., 'watchdog: BUG: soft lockup - CPU#... stuck for ...s! [stress-ng:...]') in the kernel logs. Running the stress-ng mmap test (config-workload-stressng-mmap) may reproduce the issue intermittently. Commands to check kernel logs include: 'dmesg | grep -i "soft lockup"' or 'journalctl -k | grep -i "soft lockup"'. Running 'stress-ng --mmap' can help trigger the issue for detection.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix from commit b653db77350c, which addresses the issue by properly handling page->private during THP split. Until the patch is applied, avoid running workloads that heavily use mmap with stress-ng or similar tools that may trigger the bug. Monitoring system logs for soft lockup messages and avoiding unstable kernel versions can also help mitigate impact.