CVE-2022-50483
BaseFortify
Publication date: 2025-10-04
Last updated on: 2025-10-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's enetc network driver involves improper handling of buffer references during the xdp_do_redirect() function call. Specifically, the driver zeroes out buffer page pointers before it is done using them, which leads to buffer reference count mismanagement and ultimately causes buffer leaks. When xdp_do_redirect() fails, the error handling does not properly free or recycle these buffers, causing memory leaks and forcing the system to allocate more pages repeatedly, which can degrade system performance or stability.
How can this vulnerability impact me? :
This vulnerability can lead to memory leaks in the network driver, which may cause increased memory usage and resource exhaustion over time. This can degrade system performance, potentially leading to instability or crashes in systems using the affected Linux kernel enetc driver, especially under heavy network load or when xdp_do_redirect() failures occur.
What immediate steps should I take to mitigate this vulnerability?
Update the Linux kernel to a version where the enetc driver has been patched to fix the buffer leak issue in xdp_do_redirect() failure paths. The fix involves changing the order of buffer flipping and handling buffer drops properly to avoid leaks. Until the patch is applied, avoid using affected enetc driver versions with XDP redirect features that may trigger this bug.