
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-50455 affects the Linux kernel and involves a null pointer dereference vulnerability in the NFS filesystem component. According to the vulnerability description, the issue occurs when parsing parameters in nfs_fs_context_parse_param() function, where it fails to check for null pointers when the fs string has zero length (NVD, Ubuntu).
The vulnerability stems from the vfs_parse_fs_string() function setting param->string to a null pointer when the fs string has zero length. The nfs_fs_context_parse_param() function then dereferences param->string without proper null pointer validation, which can trigger a null pointer dereference bug. The issue was resolved by adding sanity checks on param->string in nfs_fs_context_parse_param() (NVD).
If exploited, this vulnerability could cause a null pointer dereference in the Linux kernel's NFS filesystem component, potentially leading to system crashes or denial of service conditions (Ubuntu).
The vulnerability has been patched in various Linux distributions. Ubuntu has marked this as a medium priority issue and has released fixes for affected versions. System administrators should apply the available kernel updates to mitigate this vulnerability (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."