CVE-2022-50494
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| intel | intel_powerclamp | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's intel_powerclamp thermal driver. When CPU 0 is offline and intel_powerclamp tries to inject idle states, it uses smp_processor_id() in preemptible code, which can cause a kernel crash (BUG). The issue arises because smp_processor_id() is not safe to use in this context, and the code should use get_cpu() instead to avoid the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel BUG) when CPU 0 is offline and intel_powerclamp is used, potentially leading to system instability or downtime.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is caused by using smp_processor_id() in preemptible code, which can cause a kernel BUG when CPU 0 is offline and intel_powerclamp is used. To mitigate this, update the Linux kernel to a version where the intel_powerclamp driver uses get_cpu() instead of smp_processor_id(), as this change avoids the crash.