CVE-2022-50530
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's blk-mq subsystem, specifically in the blk_mq_clear_rq_mapping() function. It occurs because a pointer (set->tags[hctx_idx]) is not properly initialized when memory allocation fails (due to out-of-memory conditions), leading to a null pointer being dereferenced. The issue arose after a code change merged two steps into one without ensuring the pointer was valid before use. The fix involves checking if the pointer is NULL before dereferencing it.
How can this vulnerability impact me? :
This vulnerability can cause a null pointer dereference in the Linux kernel, which typically leads to a kernel crash (kernel panic) or system instability. This can result in denial of service (DoS) conditions where the affected system becomes unresponsive or requires a reboot.