-

CVE-2022-50382

In the Linux kernel, the following vulnerability has been resolved:

padata: Always leave BHs disabled when running ->parallel()

A deadlock can happen when an overloaded system runs ->parallel() in the
context of the current task:

    padata_do_parallel
      ->parallel()
        pcrypt_aead_enc/dec
          padata_do_serial
            spin_lock(&reorder->lock) // BHs still enabled
              <interrupt>
                ...
                  __do_softirq
                    ...
                      padata_do_serial
                        spin_lock(&reorder->lock)

It's a bug for BHs to be on in _do_serial as Steffen points out, so
ensure they're off in the "current task" case like they are in
padata_parallel_worker to avoid this situation.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 8e0681dd4eee029eb1d533d06993f7cb091efb73
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 17afa98bccec4f52203508b3f49b5f948c6fd6ac
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 7337adb20fcc0aebb50eaff2bc5a8dd9a7c6743d
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 6cfa9e60c0f88fdec6368e081ab968411cc706b1
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 34c3a47d20ae55b3600fed733bf96eafe9c500d5
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.8
Status affected
Version < 5.8
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.047
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string