CVE-2022-50499
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a double free bug in the Linux kernel's media subsystem, specifically in the dvb-core component. In the function dvb_register_device(), an entity is allocated and initialized. If initialization fails, the entity is freed, but the pointer is not set to NULL. Later, the caller tries to free the entity again if it is not NULL, causing a double free. This can also lead to a Use After Free condition in media_device_unregister_entity(). The fix involves setting the entity pointer to NULL after it is freed to prevent double freeing.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption due to double free and use-after-free conditions. Exploiting this could cause system instability, crashes, or potentially allow an attacker to execute arbitrary code with kernel privileges, compromising system security.