Skip to main content

CVE-2022-49584: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49584cvecve-2022-49584
Published: Wed Feb 26 2025 (02/26/2025, 02:23:20 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero It is possible to disable VFs while the PF driver is processing requests from the VF driver. This can result in a panic. BUG: unable to handle kernel paging request at 000000000000106c PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU: 8 PID: 0 Comm: swapper/8 Kdump: loaded Tainted: G I --------- - Hardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020 RIP: 0010:ixgbe_msg_task+0x4c8/0x1690 [ixgbe] Code: 00 00 48 8d 04 40 48 c1 e0 05 89 7c 24 24 89 fd 48 89 44 24 10 83 ff 01 0f 84 b8 04 00 00 4c 8b 64 24 10 4d 03 a5 48 22 00 00 <41> 80 7c 24 4c 00 0f 84 8a 03 00 00 0f b7 c7 83 f8 08 0f 84 8f 0a RSP: 0018:ffffb337869f8df8 EFLAGS: 00010002 RAX: 0000000000001020 RBX: 0000000000000000 RCX: 000000000000002b RDX: 0000000000000002 RSI: 0000000000000008 RDI: 0000000000000006 RBP: 0000000000000006 R08: 0000000000000002 R09: 0000000000029780 R10: 00006957d8f42832 R11: 0000000000000000 R12: 0000000000001020 R13: ffff8a00e8978ac0 R14: 000000000000002b R15: ffff8a00e8979c80 FS: 0000000000000000(0000) GS:ffff8a07dfd00000(0000) knlGS:00000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000106c CR3: 0000000063e10004 CR4: 00000000007726e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <IRQ> ? ttwu_do_wakeup+0x19/0x140 ? try_to_wake_up+0x1cd/0x550 ? ixgbevf_update_xcast_mode+0x71/0xc0 [ixgbevf] ixgbe_msix_other+0x17e/0x310 [ixgbe] __handle_irq_event_percpu+0x40/0x180 handle_irq_event_percpu+0x30/0x80 handle_irq_event+0x36/0x53 handle_edge_irq+0x82/0x190 handle_irq+0x1c/0x30 do_IRQ+0x49/0xd0 common_interrupt+0xf/0xf This can be eventually be reproduced with the following script: while : do echo 63 > /sys/class/net/<devname>/device/sriov_numvfs sleep 1 echo 0 > /sys/class/net/<devname>/device/sriov_numvfs sleep 1 done Add lock when disabling SR-IOV to prevent process VF mailbox communication.

AI-Powered Analysis

AILast updated: 06/29/2025, 22:55:51 UTC

Technical Analysis

CVE-2022-49584 is a vulnerability identified in the Linux kernel's ixgbe network driver, which handles Intel 10 Gigabit Ethernet adapters. The flaw arises when the number of SR-IOV (Single Root I/O Virtualization) Virtual Functions (VFs) is set to zero while the Physical Function (PF) driver is concurrently processing requests from the VF driver. Specifically, the vulnerability is due to a lack of proper locking mechanisms when disabling VFs, which can lead to a race condition. This race condition can cause the kernel to panic due to an invalid memory access, as evidenced by the kernel oops message and paging request failure detailed in the description. The panic occurs in the ixgbe_msg_task function, which is involved in VF mailbox communication. The vulnerability can be reproduced by repeatedly enabling and disabling VFs via the sysfs interface (writing to /sys/class/net/<devname>/device/sriov_numvfs), which triggers the race condition. The root cause is the absence of synchronization when disabling SR-IOV, allowing the PF driver to disable VFs while VF drivers are still communicating, leading to use-after-free or null pointer dereferences. This vulnerability affects Linux kernel versions containing the specified commit hash d773d1310625be3b040b436178ad59a0af8888f1. The issue has been addressed by adding locking to prevent disabling VFs during active VF driver processing, thereby preventing kernel panic. No known exploits are reported in the wild as of now, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a significant risk to systems running Linux kernels with affected ixgbe drivers, particularly those using SR-IOV for network virtualization. SR-IOV is commonly employed in data centers, cloud environments, and virtualized infrastructures to improve network performance by allowing multiple virtual machines to share a single physical network interface. A kernel panic caused by this vulnerability results in a denial of service (DoS) condition, leading to system crashes and potential downtime. This can disrupt critical services, especially in environments relying on high availability and network virtualization, such as financial institutions, telecommunications providers, and cloud service operators. While the vulnerability does not directly enable privilege escalation or remote code execution, the induced DoS can be exploited by attackers with local access or by malicious scripts to degrade service availability. The impact on confidentiality and integrity is minimal; however, availability is severely affected. Given the widespread use of Linux in European enterprise and cloud infrastructures, the vulnerability could affect a broad range of organizations, particularly those using Intel 10GbE adapters with SR-IOV enabled. The lack of known exploits reduces immediate risk, but the ease of reproducing the issue via a simple script increases the likelihood of accidental or intentional triggering.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Immediately update Linux kernels to versions where the ixgbe driver includes the locking fix for SR-IOV VF disabling. Monitor vendor advisories and apply patches promptly. 2) If patching is not immediately feasible, temporarily disable SR-IOV on affected network interfaces to prevent triggering the vulnerability. This can be done by setting sriov_numvfs to zero and avoiding rapid toggling. 3) Implement strict access controls to limit who can modify SR-IOV settings, as local user or process access is required to exploit this vulnerability. 4) Monitor system logs for kernel panics or oops messages related to ixgbe to detect potential exploitation attempts or accidental triggers. 5) In virtualized environments, coordinate with hypervisor and network teams to ensure that SR-IOV configurations are stable and not subject to frequent changes that could trigger the race condition. 6) Conduct internal audits of network driver versions and SR-IOV usage to identify at-risk systems. 7) Develop incident response plans to quickly recover from kernel panics, including automated reboots and failover mechanisms to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.412Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe4535

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 10:55:51 PM

Last updated: 7/31/2025, 7:22:32 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats