CVE-2022-49295: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: nbd: call genl_unregister_family() first in nbd_cleanup() Otherwise there may be race between module removal and the handling of netlink command, which can lead to the oops as shown below: BUG: kernel NULL pointer dereference, address: 0000000000000098 Oops: 0002 [#1] SMP PTI CPU: 1 PID: 31299 Comm: nbd-client Tainted: G E 5.14.0-rc4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:down_write+0x1a/0x50 Call Trace: start_creating+0x89/0x130 debugfs_create_dir+0x1b/0x130 nbd_start_device+0x13d/0x390 [nbd] nbd_genl_connect+0x42f/0x748 [nbd] genl_family_rcv_msg_doit.isra.0+0xec/0x150 genl_rcv_msg+0xe5/0x1e0 netlink_rcv_skb+0x55/0x100 genl_rcv+0x29/0x40 netlink_unicast+0x1a8/0x250 netlink_sendmsg+0x21b/0x430 ____sys_sendmsg+0x2a4/0x2d0 ___sys_sendmsg+0x81/0xc0 __sys_sendmsg+0x62/0xb0 __x64_sys_sendmsg+0x1f/0x30 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae Modules linked in: nbd(E-)
AI Analysis
Technical Summary
CVE-2022-49295 is a vulnerability identified in the Linux kernel's Network Block Device (nbd) module. The issue arises from improper handling during module cleanup, specifically the failure to call genl_unregister_family() before nbd_cleanup(). This omission can cause a race condition between the removal of the nbd kernel module and the processing of netlink commands. The race condition may lead to a kernel NULL pointer dereference, resulting in a kernel oops (crash). The provided kernel oops trace indicates that the fault occurs in the down_write() function, triggered during the nbd_genl_connect() netlink message handling. This vulnerability can cause system instability or denial of service (DoS) due to kernel crashes when the nbd module is being unloaded or manipulated concurrently with netlink communication. The affected versions are identified by a specific commit hash, suggesting this is a recent or development branch kernel issue. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability requires local kernel module manipulation or netlink command interaction, which typically implies some level of local or privileged access. However, the impact on system availability is significant as kernel crashes can disrupt services relying on the nbd module.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected nbd module versions, especially those using network block devices for storage virtualization or remote block device access. The potential impact includes unexpected kernel crashes leading to denial of service, which can disrupt critical infrastructure, cloud services, or enterprise environments relying on Linux-based storage solutions. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and cloud service operators, could experience service interruptions. Although exploitation requires specific conditions (module unloading and netlink command handling), the vulnerability could be leveraged in targeted attacks or during maintenance operations, increasing operational risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. European entities with extensive Linux deployments, particularly in sectors using advanced storage configurations, should consider this vulnerability seriously to maintain system stability and service continuity.
Mitigation Recommendations
To mitigate CVE-2022-49295, organizations should: 1) Apply the latest Linux kernel patches that address this issue by ensuring genl_unregister_family() is called appropriately during nbd module cleanup. 2) Avoid unloading the nbd kernel module on production systems unless necessary and ensure that any module removal is performed during maintenance windows with minimal concurrent netlink activity. 3) Implement strict access controls to limit who can load or unload kernel modules and send netlink commands, reducing the risk of accidental or malicious triggering of the race condition. 4) Monitor kernel logs for oops or crash reports related to the nbd module to detect potential exploitation or instability. 5) For virtualized environments using QEMU or similar hypervisors (as indicated by the hardware name in the oops trace), ensure hypervisor and guest kernel versions are updated and tested for this fix. 6) Employ kernel live patching solutions where available to apply fixes without downtime. 7) Conduct thorough testing of storage and network block device configurations post-patch to confirm stability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2022-49295: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: nbd: call genl_unregister_family() first in nbd_cleanup() Otherwise there may be race between module removal and the handling of netlink command, which can lead to the oops as shown below: BUG: kernel NULL pointer dereference, address: 0000000000000098 Oops: 0002 [#1] SMP PTI CPU: 1 PID: 31299 Comm: nbd-client Tainted: G E 5.14.0-rc4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:down_write+0x1a/0x50 Call Trace: start_creating+0x89/0x130 debugfs_create_dir+0x1b/0x130 nbd_start_device+0x13d/0x390 [nbd] nbd_genl_connect+0x42f/0x748 [nbd] genl_family_rcv_msg_doit.isra.0+0xec/0x150 genl_rcv_msg+0xe5/0x1e0 netlink_rcv_skb+0x55/0x100 genl_rcv+0x29/0x40 netlink_unicast+0x1a8/0x250 netlink_sendmsg+0x21b/0x430 ____sys_sendmsg+0x2a4/0x2d0 ___sys_sendmsg+0x81/0xc0 __sys_sendmsg+0x62/0xb0 __x64_sys_sendmsg+0x1f/0x30 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae Modules linked in: nbd(E-)
AI-Powered Analysis
Technical Analysis
CVE-2022-49295 is a vulnerability identified in the Linux kernel's Network Block Device (nbd) module. The issue arises from improper handling during module cleanup, specifically the failure to call genl_unregister_family() before nbd_cleanup(). This omission can cause a race condition between the removal of the nbd kernel module and the processing of netlink commands. The race condition may lead to a kernel NULL pointer dereference, resulting in a kernel oops (crash). The provided kernel oops trace indicates that the fault occurs in the down_write() function, triggered during the nbd_genl_connect() netlink message handling. This vulnerability can cause system instability or denial of service (DoS) due to kernel crashes when the nbd module is being unloaded or manipulated concurrently with netlink communication. The affected versions are identified by a specific commit hash, suggesting this is a recent or development branch kernel issue. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability requires local kernel module manipulation or netlink command interaction, which typically implies some level of local or privileged access. However, the impact on system availability is significant as kernel crashes can disrupt services relying on the nbd module.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with the affected nbd module versions, especially those using network block devices for storage virtualization or remote block device access. The potential impact includes unexpected kernel crashes leading to denial of service, which can disrupt critical infrastructure, cloud services, or enterprise environments relying on Linux-based storage solutions. Organizations with high availability requirements, such as financial institutions, telecommunications providers, and cloud service operators, could experience service interruptions. Although exploitation requires specific conditions (module unloading and netlink command handling), the vulnerability could be leveraged in targeted attacks or during maintenance operations, increasing operational risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future exploitation. European entities with extensive Linux deployments, particularly in sectors using advanced storage configurations, should consider this vulnerability seriously to maintain system stability and service continuity.
Mitigation Recommendations
To mitigate CVE-2022-49295, organizations should: 1) Apply the latest Linux kernel patches that address this issue by ensuring genl_unregister_family() is called appropriately during nbd module cleanup. 2) Avoid unloading the nbd kernel module on production systems unless necessary and ensure that any module removal is performed during maintenance windows with minimal concurrent netlink activity. 3) Implement strict access controls to limit who can load or unload kernel modules and send netlink commands, reducing the risk of accidental or malicious triggering of the race condition. 4) Monitor kernel logs for oops or crash reports related to the nbd module to detect potential exploitation or instability. 5) For virtualized environments using QEMU or similar hypervisors (as indicated by the hardware name in the oops trace), ensure hypervisor and guest kernel versions are updated and tested for this fix. 6) Employ kernel live patching solutions where available to apply fixes without downtime. 7) Conduct thorough testing of storage and network block device configurations post-patch to confirm stability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.302Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe556f
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 5:26:08 AM
Last updated: 8/6/2025, 11:00:06 PM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.