
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-50363 affects the Linux kernel and involves a vulnerability in the skmsg functionality where alloc_sk_msg() could be called from a non-sleepable context. The issue was discovered by syzbot and specifically relates to the sk_psock_verdict_recv() function which uses rcu_read_lock() protection (NVD).
The vulnerability stems from a context handling issue where alloc_sk_msg() is called from a non-sleepable context while under RCU read lock protection. The bug manifests as a sleeping function being called from an invalid context at include/linux/sched/mm.h:274, with specific conditions including in_atomic(): 0, irqs_disabled(): 0, non_block: 0, and an RCU nest depth of 1 when 0 was expected (NVD).
When triggered, this vulnerability can lead to system stability issues due to improper context handling in the kernel's networking stack. The specific impact involves potential system instability when the kernel attempts to allocate socket messages in inappropriate contexts (NVD).
The issue has been resolved by modifying the alloc_sk_msg() function to properly handle gfp arguments, ensuring appropriate context handling for memory allocations. The fix involves passing proper gfp_t arguments to avoid issues in non-sleepable contexts (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."