CVE-2022-50012

In the Linux kernel, the following vulnerability has been resolved: powerpc/64: Init jump labels before parse_early_param() On 64-bit, calling jump_label_init() in setup_feature_keys() is too late because static keys may be used in subroutines of parse_early_param() which is again subroutine of early_init_devtree(). For example booting with "threadirqs": static_key_enable_cpuslocked(): static key '0xc000000002953260' used before call to jump_label_init() WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:166 static_key_enable_cpuslocked+0xfc/0x120 ... NIP static_key_enable_cpuslocked+0xfc/0x120 LR static_key_enable_cpuslocked+0xf8/0x120 Call Trace: static_key_enable_cpuslocked+0xf8/0x120 (unreliable) static_key_enable+0x30/0x50 setup_forced_irqthreads+0x28/0x40 do_early_param+0xa0/0x108 parse_args+0x290/0x4e0 parse_early_options+0x48/0x5c parse_early_param+0x58/0x84 early_init_devtree+0xd4/0x518 early_setup+0xb4/0x214 So call jump_label_init() just before parse_early_param() in early_init_devtree(). [mpe: Add call trace to change log and minor wording edits.]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Nov 2025, 17:00

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/4bb1188e2b1ed98fa2b618cc0628ccba63c6c80f - () https://git.kernel.org/stable/c/4bb1188e2b1ed98fa2b618cc0628ccba63c6c80f - Patch
References () https://git.kernel.org/stable/c/5e14b04c8459afbeea1eeb74e81af86d7b196a4d - () https://git.kernel.org/stable/c/5e14b04c8459afbeea1eeb74e81af86d7b196a4d - Patch
References () https://git.kernel.org/stable/c/8992141cb88f1d99fd11580f4423634700a99240 - () https://git.kernel.org/stable/c/8992141cb88f1d99fd11580f4423634700a99240 - Patch
References () https://git.kernel.org/stable/c/8f9357313cdcadb0a311b44c29d4eaccc7fa632f - () https://git.kernel.org/stable/c/8f9357313cdcadb0a311b44c29d4eaccc7fa632f - Patch
References () https://git.kernel.org/stable/c/c4ced9fd10073adc854919976b88ad6004271119 - () https://git.kernel.org/stable/c/c4ced9fd10073adc854919976b88ad6004271119 - Patch
References () https://git.kernel.org/stable/c/ca829e05d3d4f728810cc5e4b468d9ebc7745eb3 - () https://git.kernel.org/stable/c/ca829e05d3d4f728810cc5e4b468d9ebc7745eb3 - Patch
References () https://git.kernel.org/stable/c/dac28dff90849af4200b8269fcdc84cdc12fa46c - () https://git.kernel.org/stable/c/dac28dff90849af4200b8269fcdc84cdc12fa46c - Patch
References () https://git.kernel.org/stable/c/e3c9e9452a8ea12d335b1e59b2c72e1b99c699b8 - () https://git.kernel.org/stable/c/e3c9e9452a8ea12d335b1e59b2c72e1b99c699b8 - Patch
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2025-06-18 11:15

Updated : 2025-11-14 17:00


NVD link : CVE-2022-50012

Mitre link : CVE-2022-50012

CVE.ORG link : CVE-2022-50012


JSON object : View

Products Affected

linux

  • linux_kernel