CVE-2022-50699Use of a Non-reentrant Function in a Concurrent Context in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() The following warning was triggered on a hardware environment: SELinux: Converting 162 SID table entries... BUG: sleeping function called from invalid context at __might_sleep+0x60/0x74 0x0 in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 5943, name: tar CPU: 7 PID: 5943 Comm: tar Tainted: P O 5.10.0 #1 Call trace: dump_backtrace+0x0/0x1c8 show

Affected Packages4 packages

Linuxlinux/linux_kernel5.0.05.10.152+2
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxee1a84fdfeedfd7362e9a8a8f15fedc3482ade2d2723875e9d677401d775a03a72abab7e9538c20c+4
debiandebian/linux< linux 6.0.6-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-q7j6-phcv-5jh3: In the Linux kernel, the following vulnerability has been resolved: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() The f2025-12-24
OSV
selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()2025-12-24
OSV
CVE-2022-50699: In the Linux kernel, the following vulnerability has been resolved: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() The fol2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()2025-12-24
Debian
CVE-2022-50699: linux - In the Linux kernel, the following vulnerability has been resolved: selinux: en...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50699 Impact, Exploitability, and Mitigation Steps | Wiz