CVE-2022-50842
Null Pointer Dereference in Linux drm/virtio 2D BO Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's drm/virtio component occurs because there was no check to ensure that a transferred 2D buffer object (BO) is a shared memory (shmem) BO. If userspace passes a VRAM BO instead, it can cause a NULL pointer dereference, potentially leading to a crash or other unintended behavior. The fix adds a check to verify that the transferred 2D BO is indeed a shmem BO to prevent this issue.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel when a VRAM BO is passed instead of a shmem BO, which may lead to system crashes or instability. This could affect the reliability and availability of systems running the vulnerable kernel.