CVE-2022-50315
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 4.9.332 (exc) |
| linux | linux_kernel | From 4.10 (inc) to 4.14.298 (exc) |
| linux | linux_kernel | From 4.15 (inc) to 4.19.264 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.221 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.152 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.76 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.0.6 (exc) |
| linux | linux_kernel | 6.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-129 | The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an array-index-out-of-bounds error in the Linux kernel's AHCI driver. Specifically, the code initializes an array with a size based on SATA_PMP_MAX_PORTS (which can be up to 16), but the actual array 'em_priv' is declared with only 8 elements. This mismatch causes the kernel to access memory beyond the array bounds, leading to undefined behavior and potential system instability or crashes.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to access invalid memory locations, which may lead to kernel crashes, system instability, or denial of service. This can affect system reliability and availability, especially on systems using the affected AHCI driver for SATA devices.