CVE-2022-50491
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a hang issue in the Linux kernel's coresight component related to the cti_disable_hw() function. The problem occurs because cti_enable_hw() and cti_disable_hw() are called from an atomic context but incorrectly use runtime power management (PM) calls that can cause the system to sleep, which is not allowed in atomic context. This leads to a system hang when running certain performance tracing commands or tests on ARM Juno platforms. The fix involved removing the runtime PM calls from these functions to prevent the hang.
How can this vulnerability impact me? :
This vulnerability can cause the system to hang (freeze) when running performance tracing tools or commands that interact with the coresight component on affected ARM platforms. This can disrupt normal system operation and debugging activities, potentially leading to downtime or inability to collect performance data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing system hangs or crashes when running Perf Coresight tests or commands such as 'perf record -e cs_etm//u -- ls'. Additionally, enabling lock and scheduler debugging may produce kernel messages indicating a sleeping function called from an invalid context, with logs similar to those shown in the description. Monitoring kernel logs for messages related to 'coresight cti_sys0: cti_enable_hw' and BUG reports about sleeping functions in atomic context can help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to apply the fix that removes the runtime PM calls from cti_enable_hw() and cti_disable_hw(), as these calls cause the hang by sleeping in atomic context. Since the runtime PM calls are not needed, ensuring your Linux kernel is updated to a version including this fix will resolve the issue. Until then, avoid running Perf Coresight tests or commands that trigger this behavior on affected hardware such as ARM Juno Development Platform.