CVE-2022-50151
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's usb: cdns3 driver, where a random warning message occurs during driver load due to improper use of memory allocation flags. Specifically, the kmalloc function was called with the GFP_DMA32 flag, which is unnecessary because dma_alloc_coherent already handles the DMA memory region correctly. This misuse triggers a warning from kmalloc_fix_flags. The fix involves removing the GFP_DMA32 flag to prevent the warning.
How can this vulnerability impact me? :
The impact of this vulnerability is primarily the generation of unexpected warning messages in the kernel log during driver load, which could confuse system administrators or developers. There is no indication of a security breach or system compromise, so the impact is limited to log noise and potential debugging difficulties.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for the specific warning message: 'Unexpected gfp: 0x4 (GFP_DMA32). Fixing up to gfp: 0xa20 (GFP_ATOMIC). Fix your code!'. You can use the command 'dmesg | grep "Unexpected gfp"' or 'journalctl -k | grep "Unexpected gfp"' to find this warning in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the usb: cdns3 driver has been fixed to remove the GFP_DMA32 flag usage in cdns3_allocate_trb_pool(). This will prevent the warning and potential issues related to improper memory allocation flags.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
There is no information indicating that this vulnerability affects compliance with common standards or regulations such as GDPR or HIPAA.