CVE-2022-50494

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
23/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash<br /> <br /> When CPU 0 is offline and intel_powerclamp is used to inject<br /> idle, it generates kernel BUG:<br /> <br /> BUG: using smp_processor_id() in preemptible [00000000] code: bash/15687<br /> caller is debug_smp_processor_id+0x17/0x20<br /> CPU: 4 PID: 15687 Comm: bash Not tainted 5.19.0-rc7+ #57<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x49/0x63<br /> dump_stack+0x10/0x16<br /> check_preemption_disabled+0xdd/0xe0<br /> debug_smp_processor_id+0x17/0x20<br /> powerclamp_set_cur_state+0x7f/0xf9 [intel_powerclamp]<br /> ...<br /> ...<br /> <br /> Here CPU 0 is the control CPU by default and changed to the current CPU,<br /> if CPU 0 offlined. This check has to be performed under cpus_read_lock(),<br /> hence the above warning.<br /> <br /> Use get_cpu() instead of smp_processor_id() to avoid this BUG.<br /> <br /> [ rjw: Subject edits ]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.9 (including) 4.9.331 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.10 (including) 4.14.296 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.15 (including) 4.19.262 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.220 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.150 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.75 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 5.19.17 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.0.3 (excluding)