CVE-2022-50564
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a mismatch in the return type of the function netiucv_tx() in the Linux kernel's s390/netiucv driver. The function was defined to return an int, but it should return netdev_tx_t to match the expected prototype in the net_device_ops structure. This mismatch can cause kernel control flow integrity (kCFI) failures when using clang's kCFI feature, potentially leading to kernel panics or thread termination at runtime. The fix adjusts the return type to match the expected prototype, preventing these issues.
How can this vulnerability impact me? :
If the return type mismatch is not fixed, and the kernel is compiled with clang's control flow integrity (kCFI) enabled, it can cause runtime failures such as kernel panics or threads being killed. This can lead to system instability or crashes on affected systems using the s390 architecture with the netiucv driver.