CVE-2022-50564
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/10/2025
Last modified:
22/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
s390/netiucv: Fix return type of netiucv_tx()<br />
<br />
With clang&#39;s kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),<br />
indirect call targets are validated against the expected function<br />
pointer prototype to make sure the call target is valid to help mitigate<br />
ROP attacks. If they are not identical, there is a failure at run time,<br />
which manifests as either a kernel panic or thread getting killed. A<br />
proposed warning in clang aims to catch these at compile time, which<br />
reveals:<br />
<br />
drivers/s390/net/netiucv.c:1854:21: error: incompatible function pointer types initializing &#39;netdev_tx_t (*)(struct sk_buff *, struct net_device *)&#39; (aka &#39;enum netdev_tx (*)(struct sk_buff *, struct net_device *)&#39;) with an expression of type &#39;int (struct sk_buff *, struct net_device *)&#39; [-Werror,-Wincompatible-function-pointer-types-strict]<br />
.ndo_start_xmit = netiucv_tx,<br />
^~~~~~~~~~<br />
<br />
->ndo_start_xmit() in &#39;struct net_device_ops&#39; expects a return type of<br />
&#39;netdev_tx_t&#39;, not &#39;int&#39;. Adjust the return type of netiucv_tx() to<br />
match the prototype&#39;s to resolve the warning and potential CFI failure,<br />
should s390 select ARCH_SUPPORTS_CFI_CLANG in the future.<br />
<br />
Additionally, while in the area, remove a comment block that is no<br />
longer relevant.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3ac0217ca9186c2f9af9a0113a331a42aa847894
- https://git.kernel.org/stable/c/4bee3c75d5bf7c2b5dc0b520410eb40449e5da31
- https://git.kernel.org/stable/c/85d392710275355425df8618ccbebbc336f5acc5
- https://git.kernel.org/stable/c/88d86d18d7cf7e9137c95f9d212bb9fff8a1b4be
- https://git.kernel.org/stable/c/d034fa43af92fc46a81d882f46d9cc3e4ffdbbcc
- https://git.kernel.org/stable/c/dfbf0122ea1b9b3e73fa22c8ff6bd888935c54fc
- https://git.kernel.org/stable/c/e7a849f740e3576e79cba403697e916f4c3a6f12
- https://git.kernel.org/stable/c/eccc88c0efe407e579291792ad07a7dedc0f63f0
- https://git.kernel.org/stable/c/f13d870fce90f01cf930bfaffecc8185ae0be21c



