CVE-2022-50498
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
22/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
eth: alx: take rtnl_lock on resume<br />
<br />
Zbynek reports that alx trips an rtnl assertion on resume:<br />
<br />
RTNL: assertion failed at net/core/dev.c (2891)<br />
RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0<br />
Call Trace:<br />
<br />
__alx_open+0x230/0x570 [alx]<br />
alx_resume+0x54/0x80 [alx]<br />
? pci_legacy_resume+0x80/0x80<br />
dpm_run_callback+0x4a/0x150<br />
device_resume+0x8b/0x190<br />
async_resume+0x19/0x30<br />
async_run_entry_fn+0x30/0x130<br />
process_one_work+0x1e5/0x3b0<br />
<br />
indeed the driver does not hold rtnl_lock during its internal close<br />
and re-open functions during suspend/resume. Note that this is not<br />
a huge bug as the driver implements its own locking, and does not<br />
implement changing the number of queues, but we need to silence<br />
the splat.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.75 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.0.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



