CVE-2022-50491Use of Blocking Code in Single-threaded, Non-blocking Context in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: coresight: cti: Fix hang in cti_disable_hw() cti_enable_hw() and cti_disable_hw() are called from an atomic context so shouldn't use runtime PM because it can result in a sleep when communicating with firmware. Since commit 3c6656337852 ("Revert "firmware: arm_scmi: Add clock management to the SCMI power domain""), this causes a hang on Juno when running the Perf Coresight tests or running this command: perf record -e cs_etm

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.75.10.154+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linux835d722ba10ac924adba1e8a46f2d80955222b4be33ce54cef5d429430e3b1ae5c8ee4f4103c4fdc+4
debiandebian/linux< linux 6.0.7-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50491: In the Linux kernel, the following vulnerability has been resolved: coresight: cti: Fix hang in cti_disable_hw() cti_enable_hw() and cti_disable_hw()2025-10-04
GHSA
GHSA-24j6-88m8-2wx3: In the Linux kernel, the following vulnerability has been resolved: coresight: cti: Fix hang in cti_disable_hw() cti_enable_hw() and cti_disable_hw(2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: coresight: cti: Fix hang in cti_disable_hw()2025-10-04
Debian
CVE-2022-50491: linux - In the Linux kernel, the following vulnerability has been resolved: coresight: ...2022