CVE-2022-50773
Null Pointer Dereference in Linux ALSA snd_mts64 Causes Kernel Panic
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a null pointer dereference in the ALSA mts64 driver in the Linux kernel. It occurs when the snd_mts64_interrupt function is called but the mts64 device was not properly initialized, leading to a null pointer dereference and a kernel panic. This happens when the snd-mts64 module is loaded multiple times without proper device initialization, causing the kernel to crash during interrupt handling.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic and system crash when the snd-mts64 module is loaded improperly or multiple times, leading to a denial of service. The system becomes unstable and may reboot unexpectedly, impacting availability and reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to load the snd-mts64 kernel module multiple times and observing for null pointer dereference errors or kernel oops messages. For example, running a script that executes 'modprobe snd-mts64' repeatedly may trigger the error. The provided test script is: cat > test_mod1.sh <<EOF modprobe snd-mts64 modprobe snd-mts64 EOF Then execute: ./test_mod1.sh If the vulnerability is present, you may see errors such as 'snd_mts64: probe of snd_mts64.0 failed with error -5', 'modprobe: ERROR: could not insert 'snd_mts64': No such device', and kernel NULL pointer dereference oops messages.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the fix that adds a check for the mts initialization during interrupt handling to prevent the null pointer dereference. Until the fix is applied, avoid loading the snd-mts64 module repeatedly or on systems where the hardware is not properly initialized to prevent kernel crashes. Monitoring for kernel oops messages related to snd_mts64 can help identify attempts to trigger the vulnerability.