VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50875

CVE-2022-50875

Description

In the Linux kernel, the following vulnerability has been resolved:

of: overlay: fix null pointer dereferencing in find_dup_cset_node_entry() and find_dup_cset_prop()

When kmalloc() fail to allocate memory in kasprintf(), fn_1 or fn_2 will be NULL, and strcmp() will cause null pointer dereference.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A null pointer dereference in the Linux kernel's Device Tree overlay functions can be triggered when kmalloc fails, leading to a crash.

Vulnerability

Overview

CVE-2022-50875 is a null pointer dereference vulnerability in the Linux kernel's Device Tree (DT) overlay implementation. The bug resides in the functions find_dup_cset_node_entry() and find_dup_cset_prop(), which are used to detect duplicate node entries and properties when applying DT overlays. When kmalloc() fails to allocate memory during a kasprintf() call, the resulting string pointer (fn_1 or fn_2) is NULL. Subsequently, a call to strcmp() with a NULL pointer causes a null pointer dereference, leading to a kernel crash [1][2][3].

Exploitation and

Impact

An attacker with the ability to trigger a memory allocation failure (e.g., by exhausting system memory) and then apply a crafted Device Tree overlay could exploit this vulnerability. The attack requires local access or the ability to load DT overlays, which typically requires root privileges or specific capabilities. Successful exploitation results in a denial of service (system crash) due to the null pointer dereference. There is no evidence of privilege escalation or remote exploitation [1][2][3].

Mitigation

The vulnerability has been patched in the Linux kernel stable releases. The fix involves adding a NULL check after kasprintf() and returning an appropriate error code if allocation fails, preventing the dereference. Users should update their kernel to a version containing the commit that addresses this issue [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.