Skip to main content

CVE-2022-49160: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49160cvecve-2022-49160
Published: Wed Feb 26 2025 (02/26/2025, 01:55:22 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix crash during module load unload test During purex packet handling the driver was incorrectly freeing a pre-allocated structure. Fix this by skipping that entry. System crashed with the following stack during a module unload test. Call Trace: sbitmap_init_node+0x7f/0x1e0 sbitmap_queue_init_node+0x24/0x150 blk_mq_init_bitmaps+0x3d/0xa0 blk_mq_init_tags+0x68/0x90 blk_mq_alloc_map_and_rqs+0x44/0x120 blk_mq_alloc_set_map_and_rqs+0x63/0x150 blk_mq_alloc_tag_set+0x11b/0x230 scsi_add_host_with_dma.cold+0x3f/0x245 qla2x00_probe_one+0xd5a/0x1b80 [qla2xxx] Call Trace with slub_debug and debug kernel: kasan_report_invalid_free+0x50/0x80 __kasan_slab_free+0x137/0x150 slab_free_freelist_hook+0xc6/0x190 kfree+0xe8/0x2e0 qla2x00_free_device+0x3bb/0x5d0 [qla2xxx] qla2x00_remove_one+0x668/0xcf0 [qla2xxx]

AI-Powered Analysis

AILast updated: 06/30/2025, 03:40:12 UTC

Technical Analysis

CVE-2022-49160 is a vulnerability identified in the Linux kernel specifically within the qla2xxx SCSI driver, which is responsible for managing certain QLogic Fibre Channel Host Bus Adapters (HBAs). The vulnerability arises from improper handling of memory during the unloading of the qla2xxx kernel module. During the processing of purex packets, the driver incorrectly frees a pre-allocated data structure, leading to a use-after-free or double-free condition. This memory mismanagement causes the system to crash, as evidenced by kernel stack traces involving functions such as sbitmap_init_node, blk_mq_init_bitmaps, and qla2x00_probe_one. Additional debugging information shows involvement of kernel slab allocator functions and KASAN (Kernel Address Sanitizer) reports, confirming invalid free operations. The root cause is the driver freeing memory that it should have skipped, leading to instability during module load/unload tests. While no known exploits are currently reported in the wild, the vulnerability can cause denial of service (system crash) and potentially could be leveraged for privilege escalation or arbitrary code execution if combined with other bugs. The affected component is the qla2xxx driver in the Linux kernel, which is commonly used in enterprise environments with QLogic Fibre Channel HBAs for storage connectivity. The vulnerability was published on February 26, 2025, and no CVSS score has been assigned yet. The issue is resolved by skipping the erroneous free operation during packet handling.

Potential Impact

For European organizations, the impact of CVE-2022-49160 primarily concerns systems running Linux kernels with the qla2xxx driver enabled and using QLogic Fibre Channel HBAs. These systems are typically found in data centers, enterprise storage networks, and critical infrastructure environments. The vulnerability can cause kernel crashes during module unload operations, leading to denial of service conditions. In environments where high availability and uptime are critical, such as financial institutions, telecommunications, healthcare, and government agencies, this could disrupt services and impact business continuity. Although no active exploitation is reported, the vulnerability presents a risk vector that could be exploited by attackers with local access to cause system instability or potentially escalate privileges if chained with other vulnerabilities. The impact on confidentiality and integrity is currently low to moderate, but availability impact is significant due to the potential for system crashes. European organizations relying on Linux-based storage servers or SAN infrastructure with QLogic adapters should consider this vulnerability a priority for patching to avoid operational disruptions.

Mitigation Recommendations

To mitigate CVE-2022-49160, European organizations should: 1) Identify all Linux systems using the qla2xxx driver, particularly those with QLogic Fibre Channel HBAs. 2) Apply the latest Linux kernel updates or patches that address this vulnerability as soon as they become available from trusted Linux distributions or kernel maintainers. 3) If immediate patching is not possible, consider temporarily disabling the qla2xxx module or unloading it only during maintenance windows to avoid triggering the crash. 4) Implement monitoring for kernel crashes and unusual module unload activity to detect potential exploitation attempts. 5) Restrict local access to trusted users only, as exploitation requires local privileges to trigger module unloads. 6) Conduct thorough testing in staging environments before deploying patches to production to ensure stability. 7) Maintain up-to-date backups and disaster recovery plans to minimize downtime in case of crashes. These steps go beyond generic advice by focusing on the specific driver and operational context of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.276Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe50d5

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 3:40:12 AM

Last updated: 8/12/2025, 4:49:07 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats