Skip to main content

CVE-2022-48746: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-48746cvecve-2022-48746
Published: Thu Jun 20 2024 (06/20/2024, 11:13:29 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix handling of wrong devices during bond netevent Current implementation of bond netevent handler only check if the handled netdev is VF representor and it missing a check if the VF representor is on the same phys device of the bond handling the netevent. Fix by adding the missing check and optimizing the check if the netdev is VF representor so it will not access uninitialized private data and crashes. BUG: kernel NULL pointer dereference, address: 000000000000036c PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI Workqueue: eth3bond0 bond_mii_monitor [bonding] RIP: 0010:mlx5e_is_uplink_rep+0xc/0x50 [mlx5_core] RSP: 0018:ffff88812d69fd60 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffff8881cf800000 RCX: 0000000000000000 RDX: ffff88812d69fe10 RSI: 000000000000001b RDI: ffff8881cf800880 RBP: ffff8881cf800000 R08: 00000445cabccf2b R09: 0000000000000008 R10: 0000000000000004 R11: 0000000000000008 R12: ffff88812d69fe10 R13: 00000000fffffffe R14: ffff88820c0f9000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88846fb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000036c CR3: 0000000103d80006 CR4: 0000000000370ea0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: mlx5e_eswitch_uplink_rep+0x31/0x40 [mlx5_core] mlx5e_rep_is_lag_netdev+0x94/0xc0 [mlx5_core] mlx5e_rep_esw_bond_netevent+0xeb/0x3d0 [mlx5_core] raw_notifier_call_chain+0x41/0x60 call_netdevice_notifiers_info+0x34/0x80 netdev_lower_state_changed+0x4e/0xa0 bond_mii_monitor+0x56b/0x640 [bonding] process_one_work+0x1b9/0x390 worker_thread+0x4d/0x3d0 ? rescuer_thread+0x350/0x350 kthread+0x124/0x150 ? set_kthread_struct+0x40/0x40 ret_from_fork+0x1f/0x30

AI-Powered Analysis

AILast updated: 06/30/2025, 20:24:52 UTC

Technical Analysis

CVE-2022-48746 is a vulnerability in the Linux kernel specifically related to the handling of network bonding events in the mlx5e driver, which is part of the Mellanox (now NVIDIA) mlx5_core kernel module. The issue arises in the bond netevent handler, which manages network device events for bonded interfaces. The vulnerability is due to insufficient validation when processing netdevice events related to Virtual Function (VF) representors. The existing implementation only checks if the netdev is a VF representor but fails to verify whether this VF representor belongs to the same physical device as the bonded interface handling the event. This missing check can lead to the handler accessing uninitialized private data structures, resulting in a NULL pointer dereference and kernel crash (kernel oops). The crash occurs in the mlx5e_is_uplink_rep function, which is called during netevent processing. The stack trace shows the flow through mlx5e_rep_esw_bond_netevent and bond_mii_monitor, indicating the vulnerability is triggered during bond monitoring activities. The fix involves adding the missing physical device check and optimizing the VF representor validation to prevent accessing uninitialized data and avoid kernel crashes. This vulnerability affects Linux kernel versions containing the vulnerable mlx5e driver implementation prior to the patch. No known exploits are reported in the wild as of the publication date (June 20, 2024). The vulnerability does not have an assigned CVSS score yet but is recognized by the Linux project and CISA enrichment. It primarily impacts systems using network bonding with Mellanox mlx5 devices, common in high-performance and data center environments.

Potential Impact

For European organizations, the impact of CVE-2022-48746 can be significant in environments relying on Linux servers with Mellanox network adapters configured for bonding. The vulnerability can cause kernel crashes leading to denial of service (DoS) conditions, disrupting network connectivity and potentially impacting critical services, especially in data centers, cloud providers, and enterprises using bonded interfaces for redundancy and performance. While the vulnerability does not directly enable privilege escalation or remote code execution, the resulting instability can cause service outages and operational disruptions. Organizations in sectors such as finance, telecommunications, healthcare, and government that depend on high availability Linux infrastructure may experience degraded service or downtime. Additionally, the kernel crash could be triggered remotely if an attacker can manipulate network events related to VF representors, although exploitation complexity is moderate. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to maintain system stability and reliability.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2022-48746 as soon as they become available from trusted sources or Linux distribution vendors. 2. For organizations using Mellanox mlx5 network adapters with bonding enabled, verify that kernel versions are updated to include the fix. 3. Temporarily disable network bonding on affected systems if patching is delayed and if operationally feasible, to mitigate risk of kernel crashes. 4. Monitor system logs for kernel oops or crashes related to mlx5e or bonding modules to detect potential exploitation attempts. 5. Implement strict network segmentation and access controls to limit exposure of systems with vulnerable configurations to untrusted networks. 6. Coordinate with hardware vendors and Linux distribution maintainers to ensure timely updates and validate patch deployment. 7. Conduct thorough testing of patched kernels in staging environments to prevent regressions in production. 8. Maintain up-to-date backups and disaster recovery plans to minimize impact of potential service disruptions caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-20T11:09:39.055Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe6051

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 8:24:52 PM

Last updated: 8/10/2025, 8:44:48 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats