
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2022-50491) was discovered related to the coresight cti component. The issue involves ctienablehw() and ctidisablehw() being called from an atomic context, which shouldn't use runtime PM as it can result in a sleep when communicating with firmware (NVD).
The vulnerability occurs when ctienablehw() and ctidisablehw() are called from an atomic context and attempt to use runtime PM, which can cause a sleep during firmware communication. This issue became apparent after commit 3c6656337852 which reverted 'firmware: armscmi: Add clock management to the SCMI power domain'. The problem was previously masked because pmruntime_put() was called with the wrong device until commit 692c9a499b28 (NVD).
When triggered, this vulnerability causes a system hang on Juno hardware when running Perf Coresight tests or executing specific commands like 'perf record -e cs_etm//u -- ls'. The issue manifests as a sleeping function being called from an invalid context, which can lead to system instability (NVD).
The issue has been fixed by removing the runtime PM calls completely, as they were determined to be unnecessary since the required operations must have already been performed when building the path for a trace (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."