CVE-2022-50063
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's DSA (Distributed Switch Architecture) felix driver. When changing the tagging protocol, if an error occurs, the system may incorrectly attempt to restore the old protocol by calling certain functions multiple times without proper cleanup. This can lead to corrupted data structures and ultimately cause a kernel crash due to a NULL pointer dereference.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to crash, leading to system instability or downtime. Specifically, it can leave network ports inoperational and cause a kernel NULL pointer dereference, which may disrupt network functionality on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to reproduce the error condition described, specifically by forcing an error while in tag_8021q mode on the affected network interface. The example commands to trigger the issue are: 1. echo ocelot-8021q > /sys/class/net/eno2/dsa/tagging 2. echo edsa > /sys/class/net/eno2/dsa/tagging # This should return -EPROTONOSUPPORT error If the kernel crashes or logs a NULL pointer dereference related to felix_change_tag_protocol or dsa_tag_8021q_unregister, it indicates the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding forcing errors in tag_8021q mode on devices using the felix driver and ensuring that the Linux kernel is updated to a version where this vulnerability is fixed. Since the issue arises from improper handling of tag protocol changes in the felix driver, applying the patch that suppresses non-changes to the tagging protocol will prevent kernel crashes and port inoperability.