Missing Lock Check Affecting kernel-64k-devel package, versions <0:5.14.0-362.8.1.el9_3


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-KERNEL64KDEVEL-15744177
  • published22 Mar 2026
  • disclosed24 Dec 2025

Introduced: 24 Dec 2025

CVE-2022-50712  (opens in a new tab)
CWE-414  (opens in a new tab)

How to fix?

Upgrade RHEL:9 kernel-64k-devel to version 0:5.14.0-362.8.1.el9_3 or higher.
This issue was patched in RHSA-2023:6583.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-64k-devel package and not the kernel-64k-devel package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

devlink: hold region lock when flushing snapshots

Netdevsim triggers a splat on reload, when it destroys regions with snapshots pending:

WARNING: CPU: 1 PID: 787 at net/core/devlink.c:6291 devlink_region_snapshot_del+0x12e/0x140 CPU: 1 PID: 787 Comm: devlink Not tainted 6.1.0-07460-g7ae9888d6e1c #580 RIP: 0010:devlink_region_snapshot_del+0x12e/0x140 Call Trace: <TASK> devl_region_destroy+0x70/0x140 nsim_dev_reload_down+0x2f/0x60 [netdevsim] devlink_reload+0x1f7/0x360 devlink_nl_cmd_reload+0x6ce/0x860 genl_family_rcv_msg_doit.isra.0+0x145/0x1c0

This is the locking assert in devlink_region_snapshot_del(), we're supposed to be holding the region->snapshot_lock here.

CVSS Base Scores

version 3.1