CVE-2022-50555
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-05
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the Linux kernel's TIPC (Transparent Inter-Process Communication) component, specifically in the tipc_topsrv_accept function. It occurs because the srv->listener pointer can be set to null by tipc_topsrv_stop() while tipc_topsrv_accept() is still using it, leading to a crash. The fix involves adding checks under the appropriate locks to ensure srv->listener is not null before use and adjusting the order of socket release to prevent use-after-free conditions.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (null pointer dereference) when the affected function is called, potentially leading to denial of service by crashing the system or kernel panic. It may affect system stability and availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fix for the null pointer dereference in tipc_topsrv_accept has been applied. The fix involves adding proper checks for srv->listener under srv->idr_lock in tipc_topsrv_accept and ensuring sock_release() is called after tipc_topsrv_work_stop() to avoid use-after-free conditions. Applying the official kernel patch or upgrading to a fixed kernel version is the recommended immediate step.