DEBIAN-CVE-2022-50504

Source
https://security-tracker.debian.org/tracker/CVE-2022-50504
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2022-50504.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2022-50504
Upstream
Published
2025-10-04T16:15:47.607Z
Modified
2025-11-20T10:16:26.841820Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid scheduling in rtasosterm() It's unsafe to use rtasbusydelay() to handle a busy status from the ibm,os-term RTAS function in rtasosterm(): Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b BUG: sleeping function called from invalid context at arch/powerpc/kernel/rtas.c:618 inatomic(): 1, irqsdisabled(): 1, nonblock: 0, pid: 1, name: swapper/0 preemptcount: 2, expected: 0 CPU: 7 PID: 1 Comm: swapper/0 Tainted: G D 6.0.0-rc5-02182-gf8553a572277-dirty #9 Call Trace: [c000000007b8f000] [c000000001337110] dumpstacklvl+0xb4/0x110 (unreliable) [c000000007b8f040] [c0000000002440e4] _mightresched+0x394/0x3c0 [c000000007b8f0e0] [c00000000004f680] rtasbusydelay+0x120/0x1b0 [c000000007b8f100] [c000000000052d04] rtasosterm+0xb8/0xf4 [c000000007b8f180] [c0000000001150fc] pseriespanic+0x50/0x68 [c000000007b8f1f0] [c000000000036354] ppcpanicplatformhandler+0x34/0x50 [c000000007b8f210] [c0000000002303c4] notifiercallchain+0xd4/0x1c0 [c000000007b8f2b0] [c0000000002306cc] atomicnotifiercallchain+0xac/0x1c0 [c000000007b8f2f0] [c0000000001d62b8] panic+0x228/0x4d0 [c000000007b8f390] [c0000000001e573c] doexit+0x140c/0x1420 [c000000007b8f480] [c0000000001e586c] maketaskdead+0xdc/0x200 Use rtasbusydelay_time() instead, which signals without side effects whether to attempt the ibm,os-term RTAS call again.

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.178-1

Affected versions

5.*

5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}