CVE-2022-50058
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's vdpa_sim_blk device where two new fields (nas and ngroups) were added but not initialized. When creating a new vdpa_sim_blk device, this lack of initialization causes a NULL pointer dereference leading to a kernel panic. Specifically, vdpasim->iommu[0] is not initialized when dev_attr.nas is 0, causing the kernel to crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic (crash) when a new vdpa_sim_blk device is created, leading to system instability or downtime. This could disrupt services running on affected systems and potentially cause data loss or require system reboots.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix which initializes the nas and ngroups fields to 1 for vdpa_sim_blk devices. Avoid creating new vdpa_sim_blk devices until the kernel is patched, as creating such devices can cause a kernel panic due to uninitialized fields.