CVE-2022-50516
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.0 (inc) to 6.0.3 (inc) |
| linux | linux_kernel | 5.19.0-rc3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's distributed lock manager (DLM) subsystem where an invalid dereference of the sb_lvbptr pointer occurs. Specifically, when a lock block (lkbsb) is placed on the stack without using the DLM_LKF_VALBLK flag, the sb_lvbptr field can become a dangling pointer, leading to a kernel crash due to an invalid memory access. The issue is fixed by adding a check for the DLM_LKF_VALBLK flag when copying the lvbptr array, preventing the use of a null or invalid pointer.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to an invalid memory access when certain DLM lock operations are performed incorrectly. This can lead to system instability or downtime, potentially affecting availability of services running on the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for crash messages related to invalid dereference of sb_lvbptr, such as page faults with addresses like 0xdeadbeef and kernel oops messages referencing dlm_unlock or memcpy_erms. You can check the kernel log using commands like 'dmesg | grep -i deadbeef' or 'journalctl -k | grep -i dlm_unlock' to identify related crashes.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the patch that fixes the issue by checking the DLM_LKF_VALBLK flag when copying the lvbptr array, ensuring that sb_lvbptr is handled correctly and not dereferenced when invalid. Until patched, avoid using dlm_lock() calls without setting DLM_LKF_VALBLK if sb_lvbptr is null to prevent crashes.