CVE-2022-50296

Source
https://cve.org/CVERecord?id=CVE-2022-50296
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50296.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50296
Downstream
Published
2025-09-15T14:45:52.121Z
Modified
2026-04-02T08:28:22.918964Z
Summary
UM: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
Details

In the Linux kernel, the following vulnerability has been resolved:

UM: cpuinfo: Fix a warning for CONFIGCPUMASKOFFSTACK

When CONFIGCPUMASKOFFSTACK and CONFIGDEBUGPERCPUMAPS is selected, cpumaxbitswarn() generates a runtime warning similar as below while we show /proc/cpuinfo. Fix this by using nrcpuids (the runtime limit) instead of NRCPUS to iterate CPUs.

[ 3.052463] ------------[ cut here ]------------ [ 3.059679] WARNING: CPU: 3 PID: 1 at include/linux/cpumask.h:108 showcpuinfo+0x5e8/0x5f0 [ 3.070072] Modules linked in: efivarfs autofs4 [ 3.076257] CPU: 0 PID: 1 Comm: systemd Not tainted 5.19-rc5+ #1052 [ 3.099465] Stack : 9000000100157b08 9000000000f18530 9000000000cf846c 9000000100154000 [ 3.109127] 9000000100157a50 0000000000000000 9000000100157a58 9000000000ef7430 [ 3.118774] 90000001001578e8 0000000000000040 0000000000000020 ffffffffffffffff [ 3.128412] 0000000000aaaaaa 1ab25f00eec96a37 900000010021de80 900000000101c890 [ 3.138056] 0000000000000000 0000000000000000 0000000000000000 0000000000aaaaaa [ 3.147711] ffff8000339dc220 0000000000000001 0000000006ab4000 0000000000000000 [ 3.157364] 900000000101c998 0000000000000004 9000000000ef7430 0000000000000000 [ 3.167012] 0000000000000009 000000000000006c 0000000000000000 0000000000000000 [ 3.176641] 9000000000d3de08 9000000001639390 90000000002086d8 00007ffff0080286 [ 3.186260] 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c [ 3.195868] ... [ 3.199917] Call Trace: [ 3.203941] [<90000000002086d8>] showstack+0x38/0x14c [ 3.210666] [<9000000000cf846c>] dumpstacklvl+0x60/0x88 [ 3.217625] [<900000000023d268>] _warn+0xd0/0x100 [ 3.223958] [<9000000000cf3c90>] warnslowpathfmt+0x7c/0xcc [ 3.231150] [<9000000000210220>] showcpuinfo+0x5e8/0x5f0 [ 3.238080] [<90000000004f578c>] seqreaditer+0x354/0x4b4 [ 3.245098] [<90000000004c2e90>] newsyncread+0x17c/0x1c4 [ 3.252114] [<90000000004c5174>] vfsread+0x138/0x1d0 [ 3.258694] [<90000000004c55f8>] ksysread+0x70/0x100 [ 3.265265] [<9000000000cfde9c>] dosyscall+0x7c/0x94 [ 3.271820] [<9000000000202fe4>] handlesyscall+0xc4/0x160 [ 3.281824] ---[ end trace 8b484262b4b8c24c ]---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50296.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
8f96aa67c2ccbd7e41b8dc992b8d13cfe206d571
Fixed
dbd964a733db015bbb9dff592c259c736398140f
Fixed
844748412be03a236dcf4a208b588162a275e189
Fixed
cd251d39b13485eb94ee65bb000d024e02c00e45
Fixed
6a73e6edcbf3cdd82796dcdf0c0f5fe5d91021af
Fixed
7efe61dc6aa45aab8a40e304fa2dae21e33b0db4
Fixed
5177bdc38eaa1c1ca6302214ab06913540cd00a2
Fixed
2e3863cc02c156b51b50592d43ffa6a13b680b0d
Fixed
16c546e148fa6d14a019431436a6f7b4087dbccd

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50296.json"