CVE-2022-50674
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's riscv vdso_join_timens() function when using vfork. Specifically, the mm->context.vdso_info is NULL in the vfork case, which leads to a kernel crash (NULL dereference) when the function tries to access this NULL pointer. This issue was fixed by handling the vdso_info setup properly without bloating the riscv mm_context_t structure.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable when a process uses vfork on riscv architecture, due to a NULL pointer dereference. This can lead to denial of service or system instability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the kernel logs for specific Oops messages related to vdso_join_timens() NULL dereference when using vfork. Look for kernel log entries similar to: "Unable to handle kernel access to user memory without uaccess routines at virtual address 0000000000000020" and "Oops [#1]" with references to vdso_join_timens in the stack trace. You can use the command 'dmesg | grep vdso_join_timens' or 'journalctl -k | grep vdso_join_timens' to find such logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as it is a kernel-level NULL pointer dereference issue in the riscv vdso code path. Until an update is applied, avoid using vfork on affected riscv systems to prevent triggering the bug.