CVE-2022-50628
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.18.0-rc5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's drm/gud component, where an uninitialized variable of type iosys_map on the stack can contain invalid boolean values. This causes the Undefined Behavior Sanitizer (UBSAN) to report an invalid load warning because the variable is expected to be a boolean (0 or 1), but it can have other values. The issue arises because iosys_map variables are not zeroed before use, leading to unpredictable behavior. The fix involves zeroing these variables to ensure valid boolean values.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to exhibit undefined behavior due to invalid boolean values being used in the drm/gud driver. While the description focuses on a UBSAN warning indicating potential instability or incorrect behavior, it does not explicitly mention security impacts such as privilege escalation or denial of service. However, undefined behavior in kernel code can potentially lead to system instability or crashes.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for UBSAN warnings related to invalid bool values in the drm/gud module. You can use the command `dmesg | grep -i ubsan` or `journalctl -k | grep -i ubsan` to look for messages similar to the provided log entries indicating invalid-load in iosys-map.h and drm/gud related errors.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the drm/gud UBSAN warning has been fixed by zeroing iosys_map variables. Until then, monitoring logs for the warning and avoiding use of affected drm/gud functionality may reduce impact. Applying the official patch or kernel update that addresses this issue is the recommended step.