CVE-2022-50728
Function Pointer Type Mismatch in Linux s390 lcs Driver Causes Kernel Panic
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a mismatch in the return type of the function lcs_start_xmit() in the Linux kernel's s390 network driver. The function was returning an int type, but it should return netdev_tx_t as expected by the ndo_start_xmit() function pointer in struct net_device_ops. This mismatch can cause kernel control flow integrity (kCFI) failures when using clang's kCFI feature, potentially leading to kernel panics or thread termination. The fix adjusts the return type of lcs_start_xmit() to match the expected prototype, preventing these runtime failures.
How can this vulnerability impact me? :
If the return type mismatch is not fixed, and the kernel is compiled with clang's kernel control flow integrity (kCFI) enabled, it can cause runtime failures such as kernel panics or threads being killed. This can lead to system instability or crashes on systems using the s390 network driver, impacting availability and reliability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the return type of lcs_start_xmit() in the s390/lcs driver has been corrected to match the expected netdev_tx_t return type. This fix resolves the kernel control flow integrity (kCFI) failure and prevents potential kernel panics or thread kills related to this issue.