CVE-2022-50771Incorrect Synchronization in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() Running rcutorture with non-zero fqs_duration module parameter in a kernel built with CONFIG_PREEMPTION=y results in the following splat: BUG: using __this_cpu_read() in preemptible [00000000] code: rcu_torture_fqs/398 caller is __this_cpu_preempt_check+0x13/0x20 CPU: 3 PID: 398 Comm: rcu_torture_fqs Not tainted 6.0.0-rc1-yoctodev-standard+ Call Trace:

Affected Packages4 packages

Linuxlinux/linux_kernel3.17.05.4.229+4
Debianlinux/linux_kernel< 5.10.178-1+3
CVEListV5linux/linuxd860d40327dde251d508a234fa00bd0d90fbb6563d92527a919edd1aa381bdd6c299dd75a8167396+6
debiandebian/linux< linux 6.1.4-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-m38r-m4xr-gxwh: In the Linux kernel, the following vulnerability has been resolved: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() Runnin2025-12-24
OSV
CVE-2022-50771: In the Linux kernel, the following vulnerability has been resolved: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() Running2025-12-24
OSV
rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()2025-12-24
Debian
CVE-2022-50771: linux - In the Linux kernel, the following vulnerability has been resolved: rcu: Fix __...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50771 Impact, Exploitability, and Mitigation Steps | Wiz