CVE-2022-50260
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.9 |
| linux | linux_kernel | 5.9 |
| linux | linux_kernel | 5.9 |
| linux | linux_kernel | 5.9 |
| linux | linux_kernel | 5.9 |
| linux | linux_kernel | 5.9 |
| linux | linux_kernel | 5.9 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's msm DRM driver where the .remove and .shutdown callbacks handle hardware shutdown inconsistently. The .remove callback is called when a device is removed and properly checks if the DRM device is registered before shutting down hardware, but the .shutdown callback, called at system shutdown, lacks this check. This inconsistency can cause drm_atomic_helper_shutdown() to be called on an uninitialized DRM device, leading to kernel panic and potential system crashes.
How can this vulnerability impact me? :
The vulnerability can cause kernel panics during system shutdown if the driver attempts to shut down hardware that was never properly initialized. This can lead to system instability, unexpected reboots, or crashes, potentially causing data loss or service interruptions.