CVE-2022-50004
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's xfrm policy code. It occurs when transmitting a socket buffer (skb) with metadata_dst attached where the destination device pointer (dst->dev) is NULL. The code incorrectly assumes dst->dev is not NULL and dereferences it, leading to a kernel crash (null pointer dereference). The issue arises because the check for a loopback skb device does not handle the case when dst->dev is NULL, causing the kernel to crash during packet transmission.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (null pointer dereference) when transmitting certain network packets, leading to a denial of service (DoS) condition. This can disrupt normal network operations and potentially cause system instability or downtime.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for null pointer dereference errors related to xfrm interface transmissions. Specifically, look for kernel oops messages or BUG reports mentioning 'xfrm_lookup_with_ifid' or 'null pointer dereference' in the kernel logs (e.g., using dmesg or journalctl). Example commands to check for such errors include: 'dmesg | grep -i xfrm', 'journalctl -k | grep -i null', or 'journalctl -k | grep -i oops'.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is fixed. The fix involves adding a check for a null dst_orig->dev in the xfrm interface code to prevent null pointer dereference. Until the kernel is updated, monitoring the kernel logs for related errors and avoiding use of xfrm interfaces in vulnerable kernel versions may reduce risk.