CVE-2022-50093
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves an invalid memory access triggered by the function node_online() when it receives a special NUMA node value (%NUMA_NO_NODE, which is -1). Because node_online() calls test_bit() without validating the input, the -1 value is interpreted as a very large unsigned number, causing an out-of-bounds memory access. This can lead to wild memory access errors and potential system instability or crashes. The fix adds a check to ensure the node value is valid before calling test_bit().
How can this vulnerability impact me? :
This vulnerability can cause invalid memory accesses in the Linux kernel, potentially leading to system crashes, instability, or unpredictable behavior. It may affect systems using Intel VT-d IOMMU with certain NUMA configurations, especially when ACPI NUMA is disabled. Such memory errors could disrupt normal operations and reduce system reliability.