CVE-2022-50041
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 5.19 |
| linux | linux_kernel | 6.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's ice driver for Intel Ethernet devices. During stress testing involving attaching and detaching Virtual Functions (VFs) from KVM and changing VF spoofcheck and trust settings simultaneously, a call trace (warning) occurred because the VF's Virtual Station Interface (VSI) was null during a VF reset. The issue was caused by an unnecessary WARN_ON() check in the ice_reset_vf function that triggered a call trace even though the driver continued to work correctly. The fix involved removing this WARN_ON() and adding a debug message indicating that the VF is already removed, preventing the unnecessary warning and call trace.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily related to unnecessary warning messages and call traces in the kernel logs during specific stress tests involving VF resets. It does not cause functional failure or security compromise because the driver continues to work correctly despite the warning. The fix removes the unnecessary warning to avoid confusion and potential log noise but does not address a security or stability issue that would directly impact system operation.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a call trace warning in the Linux kernel logs related to the ice driver, specifically mentioning 'ice_reset_vf' and null VSI during VF reset. You can detect it by checking the kernel logs for messages similar to: "WARNING: CPU: ... ice_reset_vf ... ice_vf_lib.c:508". Use the command 'dmesg | grep ice_reset_vf' or 'journalctl -k | grep ice_reset_vf' to find such traces.
What immediate steps should I take to mitigate this vulnerability?
Since the issue is caused by an unnecessary WARN_ON() in the ice driver that triggers call traces but does not affect driver functionality, the immediate mitigation is to update the Linux kernel to a version where this fix is applied. There is no need for additional configuration changes as the driver continues to work despite the warning.