CVE-2022-50248
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-11-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-415 | The product calls free() twice on the same memory address. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a double free bug in the Linux kernel's iwlwifi driver, specifically in the tx (transmit) path. It occurs when a network buffer (skb) is freed twice due to improper error handling during transmission, which can lead to kernel crashes, lockups, and memory errors detected by KASAN (Kernel Address Sanitizer). The issue arises when the function iwl_mvm_tx_skb_sta returns a non-zero value, causing the skb to be freed, but in certain cases involving TSO (TCP Segmentation Offload) skb buffers, the skb may also be freed again in an error case. The fix involves returning 0 in that error case and manually cleaning up to avoid the double free.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes and system lockups on affected systems using the iwlwifi driver, potentially leading to denial of service. The double free bug can also trigger use-after-free errors, which may destabilize the system or cause unexpected behavior in network communications.