CVE-2022-50084
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's device mapper RAID (dm_raid) code. Specifically, the function raid_status incorrectly reads memory by casting a pointer to a struct r5conf when the RAID type is not 4, 5, or 6. This leads to reading invalid memory areas, causing an address sanitizer warning (KASAN slab-out-of-bounds). The issue arises because mddev->private points to different structures depending on the RAID type, and the code does not check the RAID type before casting, resulting in unsafe memory access.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to read invalid memory, which may lead to kernel crashes or instability when using certain RAID configurations. It could potentially affect system reliability and availability, especially when running tests or operations involving device mapper RAID with unsupported RAID types for this code path.