CVE-2022-50280
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.14.3 (inc) to 4.9.337 (exc) |
| linux | linux_kernel | From 4.10 (inc) to 4.14.303 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.270 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.229 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.163 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.87 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.0.17 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's propagate_mnt() function, which handles mount propagation when creating mounts. The function fails to properly terminate at peers of the source mount (@source_mnt) when looking up copies of the source mount that become masters for copies of the source mount tree mounted on top of slaves in the destination propagation tree. This bug causes a NULL pointer dereference, which can be triggered by unprivileged users due to unprivileged user namespaces. The issue relates to the complex handling of shared mounts (peers), slave mounts, and master mounts within peer groups and propagation groups in the kernel's mount propagation mechanism.
How can this vulnerability impact me? :
The vulnerability can lead to a NULL pointer dereference in the Linux kernel, which may cause a denial of service (system crash or kernel panic). Since it is accessible to unprivileged users via unprivileged user namespaces, it could be exploited to disrupt system availability or stability.