-

CVE-2022-50870

In the Linux kernel, the following vulnerability has been resolved:

powerpc/rtas: avoid device tree lookups in rtas_os_term()

rtas_os_term() is called during panic. Its behavior depends on a couple
of conditions in the /rtas node of the device tree, the traversal of
which entails locking and local IRQ state changes. If the kernel panics
while devtree_lock is held, rtas_os_term() as currently written could
hang.

Instead of discovering the relevant characteristics at panic time,
cache them in file-static variables at boot. Note the lookup for
"ibm,extended-os-term" is converted to of_property_read_bool() since it
is a boolean property, not an RTAS function token.

[mpe: Incorporate suggested change from Nick]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < e23822c7381c59d9e42e65771b6e17c71ed30ea7
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
Version < 06a07fbb32b3a23eec20a42b1e64474da0a3b33e
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
Version < c2fa91abf22a705cf02f886cd99cff41f4ceda60
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
Version < f2167f10fcca68ab9ae3f8d94d2c704c5541ac69
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
Version < d8939315b7342860df143afe0adda6212cdd3193
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
Version < 698e682c849e356fb47a8be47ca8baa817cf31e0
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
Version < 464d10e8d797454e16a173ef1292a446b2adf21c
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
Version < ed2213bfb192ab51f09f12e9b49b5d482c6493f3
Version 088186ded490ced80758200cf8f906ed741df306
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.16
Status affected
Version < 2.6.16
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.303
Status unaffected
Version <= 4.19.*
Version 4.19.270
Status unaffected
Version <= 5.4.*
Version 5.4.229
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.87
Status unaffected
Version <= 6.0.*
Version 6.0.17
Status unaffected
Version <= 6.1.*
Version 6.1.3
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.