CVE-2022-50002
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's mlx5 network driver related to Link Aggregation Group (LAG) logic. The issue is that a flag (MLX5_LAG_FLAG_NDEVS_READY) indicating that both network devices are ready is set incorrectly when only one device is fully registered. This causes a null pointer dereference when the kernel tries to access device pointers that are not valid, leading to a kernel crash (BUG). The problem arises from asymmetry in setting and clearing this flag during device load and unload sequences.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash due to a null pointer dereference in the mlx5 network driver. This can lead to system instability, denial of service, or unexpected reboots on affected Linux systems using this driver, impacting availability and reliability of the system.