CVE-2022-50498 (GCVE-0-2022-50498)
Vulnerability from cvelistv5
Published
2025-10-04 15:43
Modified
2025-10-04 15:43
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: eth: alx: take rtnl_lock on resume Zbynek reports that alx trips an rtnl assertion on resume: RTNL: assertion failed at net/core/dev.c (2891) RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0 Call Trace: <TASK> __alx_open+0x230/0x570 [alx] alx_resume+0x54/0x80 [alx] ? pci_legacy_resume+0x80/0x80 dpm_run_callback+0x4a/0x150 device_resume+0x8b/0x190 async_resume+0x19/0x30 async_run_entry_fn+0x30/0x130 process_one_work+0x1e5/0x3b0 indeed the driver does not hold rtnl_lock during its internal close and re-open functions during suspend/resume. Note that this is not a huge bug as the driver implements its own locking, and does not implement changing the number of queues, but we need to silence the splat.
Impacted products
Vendor Product Version
Linux Linux Version: 4a5fe57e775188be96359a1934501be45fe5f705
Version: 4a5fe57e775188be96359a1934501be45fe5f705
Version: 4a5fe57e775188be96359a1934501be45fe5f705
Version: 4a5fe57e775188be96359a1934501be45fe5f705
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/atheros/alx/main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "6f1991a940b90753b34570f093a21dba366e8cc0",
              "status": "affected",
              "version": "4a5fe57e775188be96359a1934501be45fe5f705",
              "versionType": "git"
            },
            {
              "lessThan": "a845a0c4bdece2c0073ecea2fca7c4d5f0550f78",
              "status": "affected",
              "version": "4a5fe57e775188be96359a1934501be45fe5f705",
              "versionType": "git"
            },
            {
              "lessThan": "c0323c0fd07804d5874699e93f935cda0d989c67",
              "status": "affected",
              "version": "4a5fe57e775188be96359a1934501be45fe5f705",
              "versionType": "git"
            },
            {
              "lessThan": "6ad1c94e1e7e374d88f0cfd77936dddb8339aaba",
              "status": "affected",
              "version": "4a5fe57e775188be96359a1934501be45fe5f705",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/atheros/alx/main.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.14"
            },
            {
              "lessThan": "5.14",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.75",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.19.*",
              "status": "unaffected",
              "version": "5.19.17",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.0.*",
              "status": "unaffected",
              "version": "6.0.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.75",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19.17",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0.3",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1",
                  "versionStartIncluding": "5.14",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: alx: take rtnl_lock on resume\n\nZbynek reports that alx trips an rtnl assertion on resume:\n\n RTNL: assertion failed at net/core/dev.c (2891)\n RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0\n Call Trace:\n  \u003cTASK\u003e\n  __alx_open+0x230/0x570 [alx]\n  alx_resume+0x54/0x80 [alx]\n  ? pci_legacy_resume+0x80/0x80\n  dpm_run_callback+0x4a/0x150\n  device_resume+0x8b/0x190\n  async_resume+0x19/0x30\n  async_run_entry_fn+0x30/0x130\n  process_one_work+0x1e5/0x3b0\n\nindeed the driver does not hold rtnl_lock during its internal close\nand re-open functions during suspend/resume. Note that this is not\na huge bug as the driver implements its own locking, and does not\nimplement changing the number of queues, but we need to silence\nthe splat."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-04T15:43:49.383Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/6f1991a940b90753b34570f093a21dba366e8cc0"
        },
        {
          "url": "https://git.kernel.org/stable/c/a845a0c4bdece2c0073ecea2fca7c4d5f0550f78"
        },
        {
          "url": "https://git.kernel.org/stable/c/c0323c0fd07804d5874699e93f935cda0d989c67"
        },
        {
          "url": "https://git.kernel.org/stable/c/6ad1c94e1e7e374d88f0cfd77936dddb8339aaba"
        }
      ],
      "title": "eth: alx: take rtnl_lock on resume",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-50498",
    "datePublished": "2025-10-04T15:43:49.383Z",
    "dateReserved": "2025-10-04T15:39:19.464Z",
    "dateUpdated": "2025-10-04T15:43:49.383Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-50498\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-04T16:15:46.907\",\"lastModified\":\"2025-10-06T14:56:21.733\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\neth: alx: take rtnl_lock on resume\\n\\nZbynek reports that alx trips an rtnl assertion on resume:\\n\\n RTNL: assertion failed at net/core/dev.c (2891)\\n RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0\\n Call Trace:\\n  \u003cTASK\u003e\\n  __alx_open+0x230/0x570 [alx]\\n  alx_resume+0x54/0x80 [alx]\\n  ? pci_legacy_resume+0x80/0x80\\n  dpm_run_callback+0x4a/0x150\\n  device_resume+0x8b/0x190\\n  async_resume+0x19/0x30\\n  async_run_entry_fn+0x30/0x130\\n  process_one_work+0x1e5/0x3b0\\n\\nindeed the driver does not hold rtnl_lock during its internal close\\nand re-open functions during suspend/resume. Note that this is not\\na huge bug as the driver implements its own locking, and does not\\nimplement changing the number of queues, but we need to silence\\nthe splat.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6ad1c94e1e7e374d88f0cfd77936dddb8339aaba\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6f1991a940b90753b34570f093a21dba366e8cc0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a845a0c4bdece2c0073ecea2fca7c4d5f0550f78\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c0323c0fd07804d5874699e93f935cda0d989c67\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…