CVE-2022-50877
Description
In the Linux kernel, the following vulnerability has been resolved:
net: broadcom: bcm4908_enet: update TX stats after actual transmission
Queueing packets doesn't guarantee their transmission. Update TX stats after hardware confirms consuming submitted data.
This also fixes a possible race and NULL dereference. bcm4908_enet_start_xmit() could try to access skb after freeing it in the bcm4908_enet_poll_tx().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in bcm4908_enet_start_xmit() could cause a NULL dereference by freeing an skb before TX completion.
Vulnerability
A race condition exists in the Broadcom BCM4908 Ethernet driver (bcm4908_enet) in the Linux kernel. The bcm4908_enet_start_xmit() function could free a socket buffer (skb) before the hardware confirmed its transmission, leading to a use-after-free and potential NULL pointer dereference. The root cause is that TX statistics were updated when packets were queued, not after actual transmission by the hardware [1].
Exploitation
An attacker with local access and the ability to send network packets over a BCM4908 interface could trigger this race. By carefully timing packet transmissions, the attacker could cause bcm4908_enet_poll_tx() to access an skb that had already been freed by bcm4908_enet_start_xmit(), resulting in a NULL dereference or other memory corruption [1].
Impact
Successful exploitation could lead to a denial of service (system crash) due to the NULL pointer dereference. In some configurations, it might be possible to escalate privileges or leak sensitive information, though the primary impact is system instability [1].
Mitigation
The fix moves TX statistics updates to after hardware confirms consumption of submitted data, eliminating the race condition. The patch has been applied to the Linux kernel stable branches [1]. Users should update to a kernel version containing the commit ef3556ee16c6 or later.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3c9589e18a60c2adedc80faecef3556ee16c6Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.