CVE-2022-50552
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a race condition in the blk-mq subsystem when reinitializing hardware queues. Specifically, the hctx's run_work function may race with the elevator switch, leading to a use-after-free error and potential kernel panic. The issue arises because the queue is only frozen, preventing new requests but not stopping the hctx work from running, which can access an elevator pointer that is being torn down. The fix involves using a quiesced elevator switch to safely handle the queue reinitialization.
How can this vulnerability impact me? :
This vulnerability can cause kernel panics and system instability due to use-after-free errors in the Linux kernel's block multi-queue subsystem. Such crashes can lead to denial of service, data loss, or corruption, impacting system reliability and availability.