CVE-2022-50516NULL Pointer Dereference in Linux

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 94.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 7
Latest updateApr 18

Description

In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence of sb_lvbptr I experience issues when putting a lkbsb on the stack and have sb_lvbptr field to a dangled pointer while not using DLM_LKF_VALBLK. It will crash with the following kernel message, the dangled pointer is here 0xdeadbeef as example: [ 102.749317] BUG: unable to handle page fault for address: 00000000deadbeef [ 102.749320] #PF: supervisor read access in kernel mode [ 102.749323] #PF:

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel2.6.195.15.76+2
Debianlinux/linux_kernel< 5.10.251-1+3
CVEListV5linux/linuxe7fd41792fc0ee52a05fcaac87511f118328d147ef3033b435a6bac547166b793025578fab2f9df3+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

3
VulDB
Linux Kernel up to 5.15.75/5.19.16/6.0.2 dlm_lock memory corruption (Nessus ID 274646 / WID-SEC-2025-2229)2026-04-18
OSV
CVE-2022-50516: In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence of sb_lvbptr I experience issues when putting a lkb2025-10-07
GHSA
GHSA-jf3w-82f5-fq58: In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix invalid derefence of sb_lvbptr I experience issues when putting a l2025-10-07

📋Vendor Advisories

2
Red Hat
kernel: fs: dlm: fix invalid derefence of sb_lvbptr2025-10-07
Debian
CVE-2022-50516: linux - In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fi...2022