CVE-2022-50091

Source
https://cve.org/CVERecord?id=CVE-2022-50091
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50091.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50091
Downstream
Related
Published
2025-06-18T11:02:30.729Z
Modified
2026-03-20T12:24:53.651641Z
Summary
locking/csd_lock: Change csdlock_debug from early_param to __setup
Details

In the Linux kernel, the following vulnerability has been resolved:

locking/csdlock: Change csdlockdebug from early_param to __setup

The csdlockdebug kernel-boot parameter is parsed by the earlyparam() function csdlockdebug(). If set, csdlockdebug() invokes staticbranchenable() to enable csdlockwait feature, which triggers a panic on arm64 for kernels built with CONFIGSPARSEMEM=y and CONFIGSPARSEMEM_VMEMMAP=n.

With CONFIGSPARSEMEMVMEMMAP=n, __nrtosection is called in statickeyenable() and returns NULL, resulting in a NULL dereference because memsection is initialized only later in sparseinit().

This is also a problem for powerpc because earlyparam() functions are invoked earlier than jumplabelinit(), also resulting in statickeyenable() failures. These failures cause the warning "static key 'xxx' used before call to jumplabel_init()".

Thus, earlyparam is too early for csdlockwait to run staticbranch_enable(), so changes it to __setup to fix these.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50091.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8d0968cc6b8ffd8496c2ebffdfdc801f949a85e5
Fixed
d2cbdbe22b5f190055d2d0ae92e7454479343a30
Fixed
05de9e2e33b1625c71aee69e353fe906dd2be88a
Fixed
b480d1e9a8c11ecc1c99dc01814b28e3103bd0a0
Fixed
9c9b26b0df270d4f9246e483a44686fca951a29c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50091.json"