CVE-2022-50475NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 96.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 4

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Make sure "ib_port" is valid when access sysfs node The "ib_port" structure must be set before adding the sysfs kobject, and reset after removing it, otherwise it may crash when accessing the sysfs node: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050 Mem abort info: ESR = 0x96000006 Exception class = DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 Data abort i

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.145.15.86+2
Debianlinux/linux_kernel< 6.1.4-1+2
CVEListV5linux/linuxd8a5883814b9f7c08d7ff291070687d925b4f859f981c697b2f9bd5dd2f060e47ff8b5e0a2cd0c06+4
debiandebian/linux< linux 6.1.4-1 (bookworm)

Patches

🔴Vulnerability Details

2
OSV
CVE-2022-50475: In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Make sure "ib_port" is valid when access sysfs node The "ib_port" struc2025-10-04
GHSA
GHSA-c58w-c6q2-hwjw: In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Make sure "ib_port" is valid when access sysfs node The "ib_port" str2025-10-04

📋Vendor Advisories

2
Red Hat
kernel: RDMA/core: Make sure "ib_port" is valid when access sysfs node2025-10-04
Debian
CVE-2022-50475: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/core: ...2022