CVE-2022-50380
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.19 (inc) to 4.19.264 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.221 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.152 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.76 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.0.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's memory management code related to the /proc/pid/smaps_rollup interface. Specifically, a commit introduced a bug where if a process has no virtual memory areas (VMAs), the kernel code attempts to dereference a null pointer when showing smaps_rollup information, which can lead to a kernel crash or instability.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable if a process with no VMAs triggers the smaps_rollup interface. This could lead to denial of service conditions on affected systems.