CVE-2022-50842NULL Pointer Dereference in Linux

Severity
4.5MEDIUM
No vector
EPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: drm/virtio: Check whether transferred 2D BO is shmem Transferred 2D BO always must be a shmem BO. Add check for that to prevent NULL dereference if userspace passes a VRAM BO.

Affected Packages4 packages

Linuxlinux/linux_kernel5.7.05.10.150+3
Debianlinux/linux_kernel< 5.10.158-1+3
CVEListV5linux/linuxf651c8b055423057d9f41525dfdc37b4796015d1f134f261d76ae3d5ecf68db642eaa746ceb84cfb+5
debiandebian/linux< linux 6.0.3-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-rf45-2mvj-wwc3: In the Linux kernel, the following vulnerability has been resolved: drm/virtio: Check whether transferred 2D BO is shmem Transferred 2D BO always mu2025-12-30
OSV
drm/virtio: Check whether transferred 2D BO is shmem2025-12-30
OSV
CVE-2022-50842: In the Linux kernel, the following vulnerability has been resolved: drm/virtio: Check whether transferred 2D BO is shmem Transferred 2D BO always must2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: drm/virtio: Check whether transferred 2D BO is shmem2025-12-30
Debian
CVE-2022-50842: linux - In the Linux kernel, the following vulnerability has been resolved: drm/virtio:...2022

🕵️Threat Intelligence

1
Wiz
CVE-2022-50842 Impact, Exploitability, and Mitigation Steps | Wiz