CVE-2022-49624: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: atlantic: remove aq_nic_deinit() when resume aq_nic_deinit() has been called while suspending, so we don't have to call it again on resume. Actually, call it again leads to another hang issue when resuming from S3. Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992345] Call Trace: Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992346] <TASK> Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992348] aq_nic_deinit+0xb4/0xd0 [atlantic] Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992356] aq_pm_thaw+0x7f/0x100 [atlantic] Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992362] pci_pm_resume+0x5c/0x90 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992366] ? pci_pm_thaw+0x80/0x80 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992368] dpm_run_callback+0x4e/0x120 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992371] device_resume+0xad/0x200 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992373] async_resume+0x1e/0x40 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992374] async_run_entry_fn+0x33/0x120 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992377] process_one_work+0x220/0x3c0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992380] worker_thread+0x4d/0x3f0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992382] ? process_one_work+0x3c0/0x3c0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992384] kthread+0x12a/0x150 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992386] ? set_kthread_struct+0x40/0x40 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992387] ret_from_fork+0x22/0x30 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992391] </TASK> Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992392] ---[ end trace 1ec8c79604ed5e0d ]--- Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992394] PM: dpm_run_callback(): pci_pm_resume+0x0/0x90 returns -110 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992397] atlantic 0000:02:00.0: PM: failed to resume async: error -110
AI Analysis
Technical Summary
CVE-2022-49624 is a vulnerability identified in the Linux kernel specifically related to the 'atlantic' network driver, which handles Aquantia network interface cards (NICs). The issue arises from improper handling of the aq_nic_deinit() function during system power state transitions, particularly when resuming from the S3 sleep state (suspend to RAM). The vulnerability occurs because aq_nic_deinit() is called twice: once during the suspend phase and erroneously again during the resume phase. This redundant call leads to a kernel hang or system freeze upon resuming from sleep, as evidenced by kernel trace logs showing a failure in pci_pm_resume and an error code -110, indicating a timeout or device resume failure. The root cause is a race or state management bug in the driver's power management callbacks, causing the NIC to fail to properly reinitialize and thus hang the system. This vulnerability affects Linux kernel versions containing the specified commits and is resolved by removing the redundant call to aq_nic_deinit() on resume. Although no known exploits are reported in the wild, the issue can cause denial of service (DoS) conditions by freezing affected systems during power state transitions.
Potential Impact
For European organizations, the impact of CVE-2022-49624 primarily involves system availability and operational continuity. Organizations using Linux servers or workstations with Aquantia NICs and the affected kernel versions may experience system hangs or crashes when resuming from suspend states, leading to unplanned downtime. This can disrupt critical services, especially in environments relying on power-saving modes or remote management where suspend/resume cycles are common. While this vulnerability does not directly expose confidentiality or integrity risks, the resulting denial of service can affect business operations, incident response, and system reliability. Industries with high uptime requirements such as finance, healthcare, telecommunications, and manufacturing could be particularly impacted. Additionally, the issue may complicate patch management and system maintenance if systems become unresponsive during routine power state changes.
Mitigation Recommendations
To mitigate CVE-2022-49624, European organizations should: 1) Apply the latest Linux kernel updates that include the fix removing the redundant aq_nic_deinit() call on resume. This is the definitive solution to prevent the hang. 2) Identify and inventory systems using Aquantia NICs and verify kernel versions to prioritize patching. 3) Temporarily disable suspend-to-RAM (S3) states on affected systems as a workaround to avoid triggering the bug until patches are applied. This can be done via BIOS/UEFI settings or OS power management configurations. 4) Monitor system logs for pci_pm_resume errors or kernel tracebacks related to the atlantic driver to detect potential occurrences. 5) Test kernel updates in controlled environments before wide deployment to ensure compatibility and stability. 6) Engage with hardware vendors for firmware updates or driver alternatives if applicable. 7) Educate system administrators about the issue to avoid unnecessary troubleshooting delays during resume failures.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2022-49624: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: atlantic: remove aq_nic_deinit() when resume aq_nic_deinit() has been called while suspending, so we don't have to call it again on resume. Actually, call it again leads to another hang issue when resuming from S3. Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992345] Call Trace: Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992346] <TASK> Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992348] aq_nic_deinit+0xb4/0xd0 [atlantic] Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992356] aq_pm_thaw+0x7f/0x100 [atlantic] Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992362] pci_pm_resume+0x5c/0x90 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992366] ? pci_pm_thaw+0x80/0x80 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992368] dpm_run_callback+0x4e/0x120 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992371] device_resume+0xad/0x200 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992373] async_resume+0x1e/0x40 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992374] async_run_entry_fn+0x33/0x120 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992377] process_one_work+0x220/0x3c0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992380] worker_thread+0x4d/0x3f0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992382] ? process_one_work+0x3c0/0x3c0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992384] kthread+0x12a/0x150 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992386] ? set_kthread_struct+0x40/0x40 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992387] ret_from_fork+0x22/0x30 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992391] </TASK> Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992392] ---[ end trace 1ec8c79604ed5e0d ]--- Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992394] PM: dpm_run_callback(): pci_pm_resume+0x0/0x90 returns -110 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992397] atlantic 0000:02:00.0: PM: failed to resume async: error -110
AI-Powered Analysis
Technical Analysis
CVE-2022-49624 is a vulnerability identified in the Linux kernel specifically related to the 'atlantic' network driver, which handles Aquantia network interface cards (NICs). The issue arises from improper handling of the aq_nic_deinit() function during system power state transitions, particularly when resuming from the S3 sleep state (suspend to RAM). The vulnerability occurs because aq_nic_deinit() is called twice: once during the suspend phase and erroneously again during the resume phase. This redundant call leads to a kernel hang or system freeze upon resuming from sleep, as evidenced by kernel trace logs showing a failure in pci_pm_resume and an error code -110, indicating a timeout or device resume failure. The root cause is a race or state management bug in the driver's power management callbacks, causing the NIC to fail to properly reinitialize and thus hang the system. This vulnerability affects Linux kernel versions containing the specified commits and is resolved by removing the redundant call to aq_nic_deinit() on resume. Although no known exploits are reported in the wild, the issue can cause denial of service (DoS) conditions by freezing affected systems during power state transitions.
Potential Impact
For European organizations, the impact of CVE-2022-49624 primarily involves system availability and operational continuity. Organizations using Linux servers or workstations with Aquantia NICs and the affected kernel versions may experience system hangs or crashes when resuming from suspend states, leading to unplanned downtime. This can disrupt critical services, especially in environments relying on power-saving modes or remote management where suspend/resume cycles are common. While this vulnerability does not directly expose confidentiality or integrity risks, the resulting denial of service can affect business operations, incident response, and system reliability. Industries with high uptime requirements such as finance, healthcare, telecommunications, and manufacturing could be particularly impacted. Additionally, the issue may complicate patch management and system maintenance if systems become unresponsive during routine power state changes.
Mitigation Recommendations
To mitigate CVE-2022-49624, European organizations should: 1) Apply the latest Linux kernel updates that include the fix removing the redundant aq_nic_deinit() call on resume. This is the definitive solution to prevent the hang. 2) Identify and inventory systems using Aquantia NICs and verify kernel versions to prioritize patching. 3) Temporarily disable suspend-to-RAM (S3) states on affected systems as a workaround to avoid triggering the bug until patches are applied. This can be done via BIOS/UEFI settings or OS power management configurations. 4) Monitor system logs for pci_pm_resume errors or kernel tracebacks related to the atlantic driver to detect potential occurrences. 5) Test kernel updates in controlled environments before wide deployment to ensure compatibility and stability. 6) Engage with hardware vendors for firmware updates or driver alternatives if applicable. 7) Educate system administrators about the issue to avoid unnecessary troubleshooting delays during resume failures.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.421Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9821c4522896dcbdd6f9
Added to database: 5/21/2025, 9:08:49 AM
Last enriched: 6/28/2025, 12:54:28 AM
Last updated: 8/14/2025, 7:36:20 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.