-

CVE-2022-50382

In the Linux kernel, the following vulnerability has been resolved:

padata: Always leave BHs disabled when running ->parallel()

A deadlock can happen when an overloaded system runs ->parallel() in the
context of the current task:

    padata_do_parallel
      ->parallel()
        pcrypt_aead_enc/dec
          padata_do_serial
            spin_lock(&reorder->lock) // BHs still enabled
              <interrupt>
                ...
                  __do_softirq
                    ...
                      padata_do_serial
                        spin_lock(&reorder->lock)

It's a bug for BHs to be on in _do_serial as Steffen points out, so
ensure they're off in the "current task" case like they are in
padata_parallel_worker to avoid this situation.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 8e0681dd4eee029eb1d533d06993f7cb091efb73
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 17afa98bccec4f52203508b3f49b5f948c6fd6ac
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 7337adb20fcc0aebb50eaff2bc5a8dd9a7c6743d
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 6cfa9e60c0f88fdec6368e081ab968411cc706b1
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
Version < 34c3a47d20ae55b3600fed733bf96eafe9c500d5
Version 4611ce22468895acd61fee9ac1da810d60617d9a
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.8
Status affected
Version < 5.8
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.86
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.047
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String