
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48884 affects the Linux kernel's net/mlx5 driver, specifically related to command stats access after free. The vulnerability was discovered in versions from 5.18 up to (excluding) 6.1.7 and 6.2-rc1 through 6.2-rc3. The issue occurs when a command fails while the driver is reloading and cannot accept firmware commands until the command interface is reinitialized (NVD).
The vulnerability stems from a NULL pointer access that occurs when the command stats structure is freed and reallocated during mlx5 devlink reload. The issue manifests when command failures are logged to command stats after the structure has been freed. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can lead to a NULL pointer dereference in the kernel, potentially causing system crashes or denial of service. The issue specifically affects systems using the mlx5 network driver during driver reload operations (Kernel Patch).
The issue has been fixed by making command stats statically allocated on driver probe instead of dynamically allocating and freeing the structure. The fix is included in Linux kernel version 6.1.7 and later versions. Users should update their kernel to a patched version (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."