CVE-2022-50334
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 5.4.229 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.163 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.86 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.0.16 (exc) |
| linux | linux_kernel | From 6.1 (inc) to 6.1.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's hugetlbfs_parse_param() function. When parsing mount parameters for hugetlbfs, if an illegal parameter like "size=," is given, the kernel creates a struct with a null pointer for the parameter string. The hugetlbfs_parse_param() function then dereferences this null pointer without checking, causing a null pointer dereference bug. This can lead to a kernel crash or denial of service. The issue was fixed by adding a sanity check for the null pointer before dereferencing.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash or denial of service if an attacker or user provides an illegal mount parameter to the hugetlbfs filesystem. This could disrupt system availability or stability, potentially leading to system downtime or requiring a reboot.