CVE-2022-50476
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's ntb_netdev network driver where TX/RX callback handlers were incorrectly using an interrupt-unsafe function (dev_kfree_skb()) to free socket buffers (skb) in interrupt context. This misuse caused kernel WARNING messages on AMD systems and degraded TCP/IP network performance. The issue was fixed by switching to the interrupt-safe function dev_kfree_skb_any() in these handlers.
How can this vulnerability impact me? :
The vulnerability can cause kernel WARNING messages on AMD systems and significantly reduce TCP/IP network performance across the ntb_netdev interface, resulting in throughput approximately an order of magnitude below expected levels. This can impact network reliability and performance on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for kernel WARNING messages related to skb_release_head_state() indicating in_hardirq() is true. Additionally, poor TCP/IP performance across the ntb_netdev interface, significantly below expected throughput (e.g., much less than 20 Gb/s on AMD Milan based servers), can be a symptom. Specific commands to check kernel warnings include: `dmesg | grep skb_release_head_state` or `journalctl -k | grep skb_release_head_state`. Network performance can be tested using tools like `iperf` to measure TCP/IP throughput over the ntb_netdev interface.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where the ntb_netdev driver uses the interrupt context safe function dev_kfree_skb_any() instead of the unsafe dev_kfree_skb() in the TX/RX callback handlers. This update resolves the kernel WARNINGs and restores expected TCP/IP performance. Until the update is applied, monitoring for kernel warnings and performance degradation is advised.