CVE-2022-50163
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves incorrect usage of dev_tracker in the ax25 module. Specifically, an ax25_dev can be used by one or many struct ax25_cb, but the code incorrectly used a single dev_tracker instead of having one per struct ax25_cb. This led to reference tracking errors, such as freeing already released references, causing warnings and potential instability in the kernel networking code related to ax25.
How can this vulnerability impact me? :
The vulnerability can cause kernel warnings and instability due to incorrect reference tracking in the ax25 networking code. This may lead to crashes or unexpected behavior in systems using the ax25 protocol, potentially affecting network communication reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by enabling CONFIG_NET_DEV_REFCNT_TRACKER=y in the Linux kernel and monitoring kernel logs for warnings related to incorrect dev_tracker usage in ax25, such as messages like 'reference already released' or warnings from ref_tracker_free.c. You can check kernel logs using commands like 'dmesg | grep ax25' or 'journalctl -k | grep ax25' to identify related warnings or errors.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to apply the patch that fixes the incorrect dev_tracker usage in the ax25 subsystem of the Linux kernel. This involves updating the Linux kernel to a version that includes the fix for this issue.