Skip to main content

CVE-2022-48745: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48745cvecve-2022-48745
Published: Thu Jun 20 2024 (06/20/2024, 11:13:28 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Use del_timer_sync in fw reset flow of halting poll Substitute del_timer() with del_timer_sync() in fw reset polling deactivation flow, in order to prevent a race condition which occurs when del_timer() is called and timer is deactivated while another process is handling the timer interrupt. A situation that led to the following call trace: RIP: 0010:run_timer_softirq+0x137/0x420 <IRQ> recalibrate_cpu_khz+0x10/0x10 ktime_get+0x3e/0xa0 ? sched_clock_cpu+0xb/0xc0 __do_softirq+0xf5/0x2ea irq_exit_rcu+0xc1/0xf0 sysvec_apic_timer_interrupt+0x9e/0xc0 asm_sysvec_apic_timer_interrupt+0x12/0x20 </IRQ>

AI-Powered Analysis

AILast updated: 06/30/2025, 20:13:27 UTC

Technical Analysis

CVE-2022-48745 is a vulnerability identified in the Linux kernel, specifically within the Mellanox mlx5 network driver code that handles firmware reset flows related to polling mechanisms. The issue arises from the use of the del_timer() function instead of del_timer_sync() during the deactivation of timers in the firmware reset polling deactivation flow. The del_timer() function removes a timer but does not guarantee that any currently running timer handler has completed before returning. This can lead to a race condition where the timer is deactivated while another process is still handling the timer interrupt. Such a race condition can cause kernel instability or crashes, as evidenced by the call trace involving run_timer_softirq and related kernel timer interrupt functions. The vulnerability was addressed by substituting del_timer() with del_timer_sync(), which ensures that the timer handler has fully completed before the timer is considered removed, thereby preventing the race condition. This fix improves the reliability and stability of the kernel's timer handling in the mlx5 driver during firmware reset operations. The vulnerability does not have a CVSS score assigned yet and there are no known exploits in the wild at the time of publication. The affected versions are specific Linux kernel commits identified by their hashes, indicating the issue is present in certain recent kernel builds prior to the fix. This vulnerability is technical and low-level, affecting kernel timer management in network driver firmware reset flows, which could lead to system crashes or denial of service if triggered.

Potential Impact

For European organizations, the impact of CVE-2022-48745 primarily concerns systems running Linux kernels with the vulnerable mlx5 driver versions, especially those using Mellanox network hardware. Mellanox adapters are widely used in data centers, cloud infrastructure, and high-performance computing environments, which are common in European enterprises and research institutions. A successful exploitation could cause kernel crashes or system instability, leading to denial of service conditions. This could disrupt critical services, especially in sectors relying on high availability such as finance, telecommunications, healthcare, and government infrastructure. While there is no evidence of remote code execution or privilege escalation, the denial of service impact could still be significant in environments where uptime and network reliability are crucial. Additionally, since the vulnerability involves kernel-level timer handling, it could potentially be triggered by local users or processes with sufficient privileges, increasing the risk in multi-tenant or shared environments. However, the absence of known exploits and the requirement for specific kernel versions reduce the immediate threat level. Organizations using custom or older Linux kernels with Mellanox hardware should be particularly vigilant.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all Linux systems running kernels with the vulnerable mlx5 driver versions by checking kernel versions and commit hashes against the affected versions. 2) Apply the official Linux kernel patches that replace del_timer() with del_timer_sync() in the mlx5 driver firmware reset flow as soon as they are available and tested. 3) For systems where immediate patching is not feasible, consider temporarily disabling or limiting the use of affected Mellanox network interfaces if possible, or isolating vulnerable systems to reduce exposure. 4) Monitor system logs for kernel timer-related errors or crashes that may indicate attempts to trigger this race condition. 5) Implement strict access controls to limit local user privileges, reducing the risk of local exploitation. 6) Engage with hardware vendors and Linux distribution maintainers to ensure timely updates and support. 7) Incorporate this vulnerability into vulnerability management and incident response plans to quickly address any emerging exploit attempts. These steps go beyond generic advice by focusing on hardware-specific driver issues, kernel version verification, and operational controls tailored to the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-20T11:09:39.055Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe6042

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 8:13:27 PM

Last updated: 8/17/2025, 11:10:00 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats