CVE-2022-50699 — Use of a Non-reentrant Function in a Concurrent Context in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 24
Description
In the Linux kernel, the following vulnerability has been resolved:
selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()
The following warning was triggered on a hardware environment:
SELinux: Converting 162 SID table entries...
BUG: sleeping function called from invalid context at
__might_sleep+0x60/0x74 0x0
in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 5943, name: tar
CPU: 7 PID: 5943 Comm: tar Tainted: P O 5.10.0 #1
Call trace:
dump_backtrace+0x0/0x1c8
show…
Affected Packages4 packages
▶CVEListV5linux/linuxee1a84fdfeedfd7362e9a8a8f15fedc3482ade2d — 2723875e9d677401d775a03a72abab7e9538c20c+4
🔴Vulnerability Details
3GHSA▶
GHSA-q7j6-phcv-5jh3: In the Linux kernel, the following vulnerability has been resolved:
selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()
The f↗2025-12-24
OSV▶
CVE-2022-50699: In the Linux kernel, the following vulnerability has been resolved: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() The fol↗2025-12-24