SB2025062069 - Improper locking in Linux kernel sched
Published: June 20, 2025 Updated: June 21, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper locking (CVE-ID: CVE-2022-50100)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the cpus_share_cache() and ttwu_queue_cond() functions in kernel/sched/core.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/302f7b0fc337746f41c69eb08522907f6a90c643
- https://git.kernel.org/stable/c/748d2e9585ae53cb6be48e84f93d2f082ae1d135
- https://git.kernel.org/stable/c/751d4cbc43879229dbc124afefe240b70fd29a85
- https://git.kernel.org/stable/c/fde45283f4c8a91c367ea5f20f87036468755121
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18