CVE-2022-50003
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | 6.0 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's ice driver related to XSK sockets. It happens when a user tries to attach an XSK socket in txonly mode to a queue ID that does not have a corresponding Rx queue. The ice driver's XSK logic expects both Tx and Rx queues to be enabled or disabled together as a 'queue pair'. When this expectation is broken, it leads to an out-of-bounds (OOB) access to the Rx ring array, causing a kernel NULL pointer dereference and a crash (kernel oops). The fix prohibits usage of non-balanced queue IDs, allowing only combined queues reported by ethtool to be used, preventing this OOB access.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference triggered by improper use of XSK sockets with unbalanced queue IDs. This can lead to denial of service (DoS) on affected systems, potentially disrupting network operations and system stability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for kernel crash logs or oops messages related to the ice driver, specifically looking for NULL pointer dereference or out-of-bounds access errors when using XSK sockets with non-balanced queue IDs. Commands such as 'dmesg | grep ice' or 'journalctl -k | grep ice' can help identify relevant kernel error messages. Additionally, reviewing ethtool queue configurations with 'ethtool -l <interface>' and checking for usage of xdpsock with queue IDs that do not have corresponding Rx queues may indicate the problematic scenario.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves ensuring that XSK sockets are only attached to queue IDs that have both Tx and Rx queues enabled (i.e., balanced queue pairs). Avoid configurations where Tx-only queues are used without corresponding Rx queues, such as the example 'ethtool -L $IFACE rx 8 tx 96' followed by 'xdpsock -q 10 -t -z'. Applying the kernel patch that prohibits usage of non-balanced queue IDs in the ice driver is the definitive fix.