CVE-2022-50652Linux vulnerability

6 documents5 sources
Severity
N/A
No vector
EPSS
0.1%
top 80.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9

Description

In the Linux kernel, the following vulnerability has been resolved: uio: uio_dmem_genirq: Fix missing unlock in irq configuration Commit b74351287d4b ("uio: fix a sleep-in-atomic-context bug in uio_dmem_genirq_irqcontrol()") started calling disable_irq() without holding the spinlock because it can sleep. However, that fix introduced another bug: if interrupt is already disabled and a new disable request comes in, then the spinlock is not unlocked: root@localhost:~# printf '\x00\x00\x00\x00' >

Affected Packages4 packages

Linuxlinux/linux_kernel4.10.04.14.303+7
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxb77fa964ecb1d72a671234f5bea95b41f77c233a9977cb7af5a8f4738198b020436e2e56c5cd721e+11
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-7863-hf67-mmwv: In the Linux kernel, the following vulnerability has been resolved: uio: uio_dmem_genirq: Fix missing unlock in irq configuration Commit b74351287d42025-12-09
OSV
CVE-2022-50652: In the Linux kernel, the following vulnerability has been resolved: uio: uio_dmem_genirq: Fix missing unlock in irq configuration Commit b74351287d4b2025-12-09
OSV
uio: uio_dmem_genirq: Fix missing unlock in irq configuration2025-12-09

📋Vendor Advisories

2
Red Hat
kernel: uio: uio_dmem_genirq: Fix missing unlock in irq configuration2025-12-09
Debian
CVE-2022-50652: linux - In the Linux kernel, the following vulnerability has been resolved: uio: uio_dm...2022