CVE-2022-50494Linux vulnerability

5 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 97.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash When CPU 0 is offline and intel_powerclamp is used to inject idle, it generates kernel BUG: BUG: using smp_processor_id() in preemptible [00000000] code: bash/15687 caller is debug_smp_processor_id+0x17/0x20 CPU: 4 PID: 15687 Comm: bash Not tainted 5.19.0-rc7+ #57 Call Trace: dump_stack_lvl+0x49/0x63 dump_stack+0x10/0x16 check_preemption_di

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel3.94.9.331+7
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxd6d71ee4a14ae602db343ec48c491851d7ec52673e799e815097febbcb81b472285be824f5d089f9+9
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-256h-gf49-r65r: In the Linux kernel, the following vulnerability has been resolved: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid c2025-10-04
OSV
CVE-2022-50494: In the Linux kernel, the following vulnerability has been resolved: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid cr2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash2025-10-04
Debian
CVE-2022-50494: linux - In the Linux kernel, the following vulnerability has been resolved: thermal: in...2022