CVE-2022-50676
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's RDS (Reliable Datagram Sockets) TCP code where a lock (sock lock) was held incorrectly when cancelling delayed work in the function rds_tcp_reset_callbacks(). The issue arose because cancel_delayed_work_sync() was called within a section protected by lock_sock(), but rds_send_xmit() might also call lock_sock(), leading to potential lockdep warnings and improper locking behavior. The fix was to remove the unnecessary lock_sock() protection around cancel_delayed_work_sync() to avoid these locking conflicts.
How can this vulnerability impact me? :
The vulnerability could lead to locking issues in the Linux kernel's RDS TCP code, potentially causing deadlocks or other synchronization problems. This could affect the stability and reliability of network communications using RDS, possibly leading to system hangs or degraded performance.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for this vulnerability, specifically the commit ac3615e7f3cffe2a which removes the improper use of lock_sock() around cancel_delayed_work_sync() in rds_tcp_reset_callbacks().