CVE-2022-50538 (GCVE-0-2022-50538)
Vulnerability from cvelistv5
Published
2025-10-07 15:21
Modified
2025-10-07 15:21
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
vme: Fix error not catched in fake_init()
In fake_init(), __root_device_register() is possible to fail but it's
ignored, which can cause unregistering vme_root fail when exit.
general protection fault,
probably for non-canonical address 0xdffffc000000008c
KASAN: null-ptr-deref in range [0x0000000000000460-0x0000000000000467]
RIP: 0010:root_device_unregister+0x26/0x60
Call Trace:
<TASK>
__x64_sys_delete_module+0x34f/0x540
do_syscall_64+0x38/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd
Return error when __root_device_register() fails.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a Version: 658bcdae9c6755806e66b33e29d56b33a3ff421a |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/staging/vme_user/vme_fake.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "e831fdd60e5863ee03173baf5a0f7c5450b44381",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "69b43937f14bdc3594f57f1a507a14f3d1187136",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "09be0e7ac5f9374b6f8de72c89ed67129af71f65",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "f3f65c4177846c483bf009f8c512ab04b3c62466",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "37d3de40c1ffb6a5e626bf46ff5ef5766c824e2c",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "4bc217b25ea81034fad8e33fd33e4659f086421d",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "a2a93546d414c7fe4862b87183fb737d1300d9d2",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "60ff9bd4ffc87bace581e235a6728f5ac8e5071f",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
},
{
"lessThan": "7bef797d707f1744f71156b21d41e3b8c946631f",
"status": "affected",
"version": "658bcdae9c6755806e66b33e29d56b33a3ff421a",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/staging/vme_user/vme_fake.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.9"
},
{
"lessThan": "4.9",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"version": "4.9.337",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"version": "4.14.303",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.270",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.229",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.163",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.86",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.0.*",
"status": "unaffected",
"version": "6.0.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.2",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.337",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.303",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.270",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.229",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.163",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.86",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.16",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.2",
"versionStartIncluding": "4.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2",
"versionStartIncluding": "4.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvme: Fix error not catched in fake_init()\n\nIn fake_init(), __root_device_register() is possible to fail but it\u0027s\nignored, which can cause unregistering vme_root fail when exit.\n\n general protection fault,\n probably for non-canonical address 0xdffffc000000008c\n KASAN: null-ptr-deref in range [0x0000000000000460-0x0000000000000467]\n RIP: 0010:root_device_unregister+0x26/0x60\n Call Trace:\n \u003cTASK\u003e\n __x64_sys_delete_module+0x34f/0x540\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nReturn error when __root_device_register() fails."
}
],
"providerMetadata": {
"dateUpdated": "2025-10-07T15:21:04.428Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/e831fdd60e5863ee03173baf5a0f7c5450b44381"
},
{
"url": "https://git.kernel.org/stable/c/69b43937f14bdc3594f57f1a507a14f3d1187136"
},
{
"url": "https://git.kernel.org/stable/c/09be0e7ac5f9374b6f8de72c89ed67129af71f65"
},
{
"url": "https://git.kernel.org/stable/c/f3f65c4177846c483bf009f8c512ab04b3c62466"
},
{
"url": "https://git.kernel.org/stable/c/37d3de40c1ffb6a5e626bf46ff5ef5766c824e2c"
},
{
"url": "https://git.kernel.org/stable/c/4bc217b25ea81034fad8e33fd33e4659f086421d"
},
{
"url": "https://git.kernel.org/stable/c/a2a93546d414c7fe4862b87183fb737d1300d9d2"
},
{
"url": "https://git.kernel.org/stable/c/60ff9bd4ffc87bace581e235a6728f5ac8e5071f"
},
{
"url": "https://git.kernel.org/stable/c/7bef797d707f1744f71156b21d41e3b8c946631f"
}
],
"title": "vme: Fix error not catched in fake_init()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2022-50538",
"datePublished": "2025-10-07T15:21:04.428Z",
"dateReserved": "2025-10-07T15:15:38.666Z",
"dateUpdated": "2025-10-07T15:21:04.428Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-50538\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-07T16:15:38.067\",\"lastModified\":\"2025-10-08T19:38:32.610\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nvme: Fix error not catched in fake_init()\\n\\nIn fake_init(), __root_device_register() is possible to fail but it\u0027s\\nignored, which can cause unregistering vme_root fail when exit.\\n\\n general protection fault,\\n probably for non-canonical address 0xdffffc000000008c\\n KASAN: null-ptr-deref in range [0x0000000000000460-0x0000000000000467]\\n RIP: 0010:root_device_unregister+0x26/0x60\\n Call Trace:\\n \u003cTASK\u003e\\n __x64_sys_delete_module+0x34f/0x540\\n do_syscall_64+0x38/0x90\\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\\n\\nReturn error when __root_device_register() fails.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/09be0e7ac5f9374b6f8de72c89ed67129af71f65\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/37d3de40c1ffb6a5e626bf46ff5ef5766c824e2c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4bc217b25ea81034fad8e33fd33e4659f086421d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/60ff9bd4ffc87bace581e235a6728f5ac8e5071f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/69b43937f14bdc3594f57f1a507a14f3d1187136\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7bef797d707f1744f71156b21d41e3b8c946631f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a2a93546d414c7fe4862b87183fb737d1300d9d2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e831fdd60e5863ee03173baf5a0f7c5450b44381\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f3f65c4177846c483bf009f8c512ab04b3c62466\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…