CVE-2022-50117
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's vfio core and mlx5 driver. The vfio core checks if the driver sets migration operations (like set_state/get_state) and calls them accordingly. However, the mlx5 driver sets these migration operations without considering whether it supports migration capabilities. This can lead to unexpected behavior or kernel crashes (Oops) if user space calls these operations when the driver does not support migration, for example because the migration state_mutex is not initialized. The fix involves splitting migration operations from main device operations so that drivers only set migration ops when applicable, and validating operations during registration.
How can this vulnerability impact me? :
This vulnerability can cause unexpected usage or kernel crashes (Oops) if user space calls migration operations on a driver that does not support migration. This can lead to system instability or denial of service due to kernel faults.