CVE-2022-50625
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of the SBSA PL011 UART driver. The driver incorrectly accesses the DMACR register, which is not supported by the generic SBSA UART interface. While most real hardware ignores this access, some virtual hardware like Xen virtual SBSA PL011 (vpl011) does not implement the DMACR register and triggers a data abort fault when accessed. This causes the Linux kernel to experience a segmentation fault and crash the application using the UART.
How can this vulnerability impact me? :
If you are running Linux on virtualized SBSA PL011 hardware such as Xen vpl011, this vulnerability can cause your system or applications to crash due to segmentation faults triggered by unhandled data abort faults when the driver accesses the unsupported DMACR register. This can lead to instability and potential service interruptions.