Memory Out-of-Bound Access in Linux Kernel SELinux Component
CVE-2022-50200

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
18 June 2025

What is CVE-2022-50200?

A vulnerability has been reported in the SELinux component of the Linux kernel, which allows for memory out-of-bound access if appropriate boundary checks are not enforced. This oversight can lead to potential exploitation, compromising system integrity and stability. Proper boundary checks should be implemented in the put_entry() function, similar to the existing checks in the next_entry() function, to fortify the kernel’s defenses against unauthorized memory accesses.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2dabe6a872a5744865372eb30ea51e8ccd21305a

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 477722f31ad73aa779154d1d7e00825538389f76

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 90bdf50ae70c5571a277b5601e4f5df210831e0a

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-50200 : Memory Out-of-Bound Access in Linux Kernel SELinux Component