CVE-2022-50504
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0.0-rc5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's powerpc/rtas code involves unsafe use of the function rtas_busy_delay() to handle a busy status from the ibm,os-term RTAS function in rtas_os_term(). Using rtas_busy_delay() in this context can cause a kernel panic due to a sleeping function being called from an invalid context, leading to system instability or crash. The fix is to use rtas_busy_delay_time() instead, which safely signals whether to retry the ibm,os-term RTAS call without causing side effects.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic on affected Linux systems running on PowerPC architecture, resulting in a system crash and potential downtime. This can disrupt normal operations, cause data loss, and require system reboot or recovery.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version that includes the fix for this vulnerability, which replaces the unsafe use of rtas_busy_delay() with rtas_busy_delay_time() in the rtas_os_term() function to avoid kernel panic issues.