Skip to main content

CVE-2022-49295: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49295cvecve-2022-49295
Published: Wed Feb 26 2025 (02/26/2025, 02:01:25 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: nbd: call genl_unregister_family() first in nbd_cleanup() Otherwise there may be race between module removal and the handling of netlink command, which can lead to the oops as shown below: BUG: kernel NULL pointer dereference, address: 0000000000000098 Oops: 0002 [#1] SMP PTI CPU: 1 PID: 31299 Comm: nbd-client Tainted: G E 5.14.0-rc4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:down_write+0x1a/0x50 Call Trace: start_creating+0x89/0x130 debugfs_create_dir+0x1b/0x130 nbd_start_device+0x13d/0x390 [nbd] nbd_genl_connect+0x42f/0x748 [nbd] genl_family_rcv_msg_doit.isra.0+0xec/0x150 genl_rcv_msg+0xe5/0x1e0 netlink_rcv_skb+0x55/0x100 genl_rcv+0x29/0x40 netlink_unicast+0x1a8/0x250 netlink_sendmsg+0x21b/0x430 ____sys_sendmsg+0x2a4/0x2d0 ___sys_sendmsg+0x81/0xc0 __sys_sendmsg+0x62/0xb0 __x64_sys_sendmsg+0x1f/0x30 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae Modules linked in: nbd(E-)

AI-Powered Analysis

AILast updated: 06/30/2025, 05:26:08 UTC

Technical Analysis

CVE-2022-49295 is a vulnerability identified in the Linux kernel's Network Block Device (nbd) module. The issue arises from improper handling during module cleanup, specifically the failure to call genl_unregister_family() before nbd_cleanup(). This omission can cause a race condition between the removal of the nbd kernel module and the processing of netlink commands. The race condition may lead to a kernel NULL pointer dereference, resulting in a kernel oops (crash). The provided kernel oops trace indicates that the fault occurs in the down_write() function, triggered during the nbd_genl_connect() netlink message handling. This vulnerability can cause system instability or denial of service (DoS) due to kernel crashes when the nbd module is being unloaded or manipulated concurrently with netlink communication. The affected versions are identified by a specific commit hash, suggesting this is a recent or development branch kernel issue. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability requires local kernel module manipulation or netlink command interaction, which typically implies some level of local or privileged access. However, the impact on system availability is significant as kernel crashes can disrupt services relying on the nbd module.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected nbd module versions, especially those using network block devices for storage virtualization or remote block device access. The potential impact includes unexpected kernel crashes leading to denial of service, which can disrupt critical infrastructure, cloud services, or enterprise environments relying on Linux-based storage solutions. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and cloud service operators, could experience service interruptions. Although exploitation requires specific conditions (module unloading and netlink command handling), the vulnerability could be leveraged in targeted attacks or during maintenance operations, increasing operational risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. European entities with extensive Linux deployments, particularly in sectors using advanced storage configurations, should consider this vulnerability seriously to maintain system stability and service continuity.

Mitigation Recommendations

To mitigate CVE-2022-49295, organizations should: 1) Apply the latest Linux kernel patches that address this issue by ensuring genl_unregister_family() is called appropriately during nbd module cleanup. 2) Avoid unloading the nbd kernel module on production systems unless necessary and ensure that any module removal is performed during maintenance windows with minimal concurrent netlink activity. 3) Implement strict access controls to limit who can load or unload kernel modules and send netlink commands, reducing the risk of accidental or malicious triggering of the race condition. 4) Monitor kernel logs for oops or crash reports related to the nbd module to detect potential exploitation or instability. 5) For virtualized environments using QEMU or similar hypervisors (as indicated by the hardware name in the oops trace), ensure hypervisor and guest kernel versions are updated and tested for this fix. 6) Employ kernel live patching solutions where available to apply fixes without downtime. 7) Conduct thorough testing of storage and network block device configurations post-patch to confirm stability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.302Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe556f

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 5:26:08 AM

Last updated: 8/6/2025, 11:00:06 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats