CVE-2022-50370
BaseFortify
Publication date: 2025-09-17
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.12 (inc) to 5.15.75 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 5.19.17 (exc) |
| linux | linux_kernel | From 6.0 (inc) to 6.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the Linux kernel's i2c designware driver related to handling unexpected device interrupts. Specifically, after resuming from the S3 sleep state on certain Intel Alder Lake-S Gigabyte motherboards, the system can crash due to a NULL pointer dereference in the i2c_dw_xfer_msg() function. The issue arises because the driver does not properly handle interrupts (like TX_EMPTY) when the device is supposed to be idle, leading to the use of invalid or stale data pointers. The root cause is that the firmware uses the I2C controller during resume without disabling it before handing control to the OS, and the driver was not prepared for such interrupts in this state. The fix introduces a software status flag to track when the controller is active and masks unexpected interrupts when it is not.
How can this vulnerability impact me? :
This vulnerability can cause system crashes (NULL pointer dereference) when resuming from the S3 sleep state on affected hardware. This can lead to system instability, unexpected reboots, or data loss during resume operations, impacting system reliability and availability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the system firmware (UEFI) as the issue is reportedly fixed by a UEFI update. Additionally, ensure your Linux kernel includes the fix that introduces a software status flag STATUS_ACTIVE to properly handle unexpected interrupts from the i2c_designware controller during resume from S3 sleep state. Avoid resuming from S3 if possible until the fix is applied.