VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50877

CVE-2022-50877

Description

In the Linux kernel, the following vulnerability has been resolved:

net: broadcom: bcm4908_enet: update TX stats after actual transmission

Queueing packets doesn't guarantee their transmission. Update TX stats after hardware confirms consuming submitted data.

This also fixes a possible race and NULL dereference. bcm4908_enet_start_xmit() could try to access skb after freeing it in the bcm4908_enet_poll_tx().

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A race condition in bcm4908_enet_start_xmit() could cause a NULL dereference by freeing an skb before TX completion.

Vulnerability

A race condition exists in the Broadcom BCM4908 Ethernet driver (bcm4908_enet) in the Linux kernel. The bcm4908_enet_start_xmit() function could free a socket buffer (skb) before the hardware confirmed its transmission, leading to a use-after-free and potential NULL pointer dereference. The root cause is that TX statistics were updated when packets were queued, not after actual transmission by the hardware [1].

Exploitation

An attacker with local access and the ability to send network packets over a BCM4908 interface could trigger this race. By carefully timing packet transmissions, the attacker could cause bcm4908_enet_poll_tx() to access an skb that had already been freed by bcm4908_enet_start_xmit(), resulting in a NULL dereference or other memory corruption [1].

Impact

Successful exploitation could lead to a denial of service (system crash) due to the NULL pointer dereference. In some configurations, it might be possible to escalate privileges or leak sensitive information, though the primary impact is system instability [1].

Mitigation

The fix moves TX statistics updates to after hardware confirms consumption of submitted data, eliminating the race condition. The patch has been applied to the Linux kernel stable branches [1]. Users should update to a kernel version containing the commit ef3556ee16c6 or later.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.