CVE-2022-50851
Use-After-Free Vulnerability in Linux vhost_vdpa Causes Kernel Crash
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's vhost_vdpa component, where unmapping very large memory regions during vIOMMU testing can cause the kernel to crash. The issue is due to improper handling of large memory unmap requests, which leads to a crash in the Intel IOMMU driver. The fix involves adding a new function, vhost_vdpa_general_unmap(), that only unmaps memory saved in the IOTLB, preventing the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when a guest system attempts to unmap very large memory regions in a virtualized environment using vhost_vdpa and vIOMMU. Such crashes can lead to system instability, downtime, and potential loss of data or service availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for kernel crash messages related to vhost_vdpa and iommu unmap operations. Specifically, look for kernel BUG messages and call traces similar to the provided example, which includes lines like 'kernel BUG at drivers/iommu/intel/iommu.c:1174!' and call traces involving vhost_vdpa_unmap and intel_iommu_unmap_pages. You can use commands such as 'dmesg | grep -i vhost_vdpa' or 'journalctl -k | grep -i iommu' to search for relevant kernel error messages indicating the crash.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Linux kernel to a version that includes the fix for this vulnerability, which adds the new function vhost_vdpa_general_unmap() to properly handle unmapping large memory regions and prevent crashes. Until the update is applied, monitoring for crash symptoms and avoiding workloads that trigger large memory unmaps in vhost_vdpa may reduce the risk of system crashes.