CVE-2022-50486
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to a type mismatch in the Linux kernel's network driver code for TI ethernet devices. Specifically, the function netcp_ndo_start_xmit() was declared with an incorrect return type 'int' instead of the expected 'netdev_tx_t'. With Clang's kernel control flow integrity (kCFI) enabled, this mismatch causes runtime failures such as kernel panics or thread termination because indirect function calls are validated against expected prototypes to prevent return-oriented programming (ROP) attacks. Fixing the return type resolves these runtime failures and improves kernel security.
How can this vulnerability impact me? :
If this vulnerability is present, it can cause the Linux kernel to panic or kill threads unexpectedly when using the affected TI ethernet driver, leading to system instability or denial of service. This can disrupt network functionality and potentially impact the reliability of systems running this kernel version with the affected driver and Clang's kernel control flow integrity enabled.