CVE-2022-50468
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's cros_usbpd_notify driver. The issue is that the initialization function cros_usbpd_notify_init() does not check the return value of platform_driver_register(). As a result, the driver can appear to install successfully even if platform_driver_register() fails. This leads to an unexpected driver unregister warning when removing the module, indicating improper error handling during driver registration.
How can this vulnerability impact me? :
The vulnerability can cause instability or unexpected behavior in the system when the cros_usbpd_notify driver is loaded or unloaded. Specifically, it may lead to warnings and potential issues related to driver unregistration, which could affect system reliability or cause kernel errors during module removal.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be done by checking for the presence and status of the cros_usbpd_notify kernel module and monitoring for the specific WARNING message during module removal. For example, use 'lsmod | grep cros_usbpd_notify' to check if the module is loaded, and 'dmesg | grep "Unexpected driver unregister!"' to find related warning messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the cros_usbpd_notify_init() function properly checks the return value of platform_driver_register() and unregisters the driver on failure. Until then, avoid removing the cros_usbpd_notify module to prevent the warning and potential issues.