-
CVE-2022-50870
- EPSS 0.04%
- Veröffentlicht 30.12.2025 12:15:40
- Zuletzt bearbeitet 31.12.2025 20:43:05
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entails locking and local IRQ state changes. If the kernel panics while devtree_lock is held, rtas_os_term() as currently written could hang. Instead of discovering the relevant characteristics at panic time, cache them in file-static variables at boot. Note the lookup for "ibm,extended-os-term" is converted to of_property_read_bool() since it is a boolean property, not an RTAS function token. [mpe: Incorporate suggested change from Nick]
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
e23822c7381c59d9e42e65771b6e17c71ed30ea7
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
Version <
06a07fbb32b3a23eec20a42b1e64474da0a3b33e
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
Version <
c2fa91abf22a705cf02f886cd99cff41f4ceda60
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
Version <
f2167f10fcca68ab9ae3f8d94d2c704c5541ac69
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
Version <
d8939315b7342860df143afe0adda6212cdd3193
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
Version <
698e682c849e356fb47a8be47ca8baa817cf31e0
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
Version <
464d10e8d797454e16a173ef1292a446b2adf21c
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
Version <
ed2213bfb192ab51f09f12e9b49b5d482c6493f3
Version
088186ded490ced80758200cf8f906ed741df306
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.16
Status
affected
Version <
2.6.16
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.303
Status
unaffected
Version <=
4.19.*
Version
4.19.270
Status
unaffected
Version <=
5.4.*
Version
5.4.229
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.17
Status
unaffected
Version <=
6.1.*
Version
6.1.3
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|