CVE-2022-50118
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's powerpc performance monitoring unit (PMU) handling. Specifically, it involves a warning (WARN_ON) triggered when a pending performance monitoring interrupt (PMI) is detected but no corresponding performance monitoring counter (PMC) overflow is found among active events. The issue arises because the overflowed PMC might belong to an inactive event, causing unnecessary warnings and inefficient handling. The fix removes this warning and optimizes the clearing of pending PMI to avoid extra overhead and false warnings.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to system performance and stability during performance monitoring on powerpc architectures. The unnecessary warnings could lead to confusion during debugging and potentially increased context switch overhead due to inefficient PMI handling. However, it does not indicate a direct security breach or data compromise.