CVE-2022-50771
Use-After-Free in Linux Kernel RCU Component Causes Kernel Panic
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0.0-rc1-yoctodev-standard |
| linux | kernel | 6.0.0-rc1-yoctodev-standard |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel where the function rcu_force_quiescent_state() incorrectly uses __this_cpu_read() in preemptible code, which leads to a lock dependency warning and a kernel crash (splat) during testing with rcutorture. The correct function to use in this context is raw_cpu_read(). The issue has been fixed by replacing __this_cpu_read() with raw_cpu_read() in the affected code.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (BUG) under certain conditions when running with preemption enabled and specific testing parameters. This could lead to system instability or downtime if the affected code path is executed.