Skip to main content

CVE-2022-49624: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49624cvecve-2022-49624
Published: Wed Feb 26 2025 (02/26/2025, 02:23:40 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: atlantic: remove aq_nic_deinit() when resume aq_nic_deinit() has been called while suspending, so we don't have to call it again on resume. Actually, call it again leads to another hang issue when resuming from S3. Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992345] Call Trace: Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992346] <TASK> Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992348] aq_nic_deinit+0xb4/0xd0 [atlantic] Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992356] aq_pm_thaw+0x7f/0x100 [atlantic] Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992362] pci_pm_resume+0x5c/0x90 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992366] ? pci_pm_thaw+0x80/0x80 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992368] dpm_run_callback+0x4e/0x120 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992371] device_resume+0xad/0x200 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992373] async_resume+0x1e/0x40 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992374] async_run_entry_fn+0x33/0x120 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992377] process_one_work+0x220/0x3c0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992380] worker_thread+0x4d/0x3f0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992382] ? process_one_work+0x3c0/0x3c0 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992384] kthread+0x12a/0x150 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992386] ? set_kthread_struct+0x40/0x40 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992387] ret_from_fork+0x22/0x30 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992391] </TASK> Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992392] ---[ end trace 1ec8c79604ed5e0d ]--- Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992394] PM: dpm_run_callback(): pci_pm_resume+0x0/0x90 returns -110 Jul 8 03:09:44 u-Precision-7865-Tower kernel: [ 5910.992397] atlantic 0000:02:00.0: PM: failed to resume async: error -110

AI-Powered Analysis

AILast updated: 06/28/2025, 00:54:28 UTC

Technical Analysis

CVE-2022-49624 is a vulnerability identified in the Linux kernel specifically related to the 'atlantic' network driver, which handles Aquantia network interface cards (NICs). The issue arises from improper handling of the aq_nic_deinit() function during system power state transitions, particularly when resuming from the S3 sleep state (suspend to RAM). The vulnerability occurs because aq_nic_deinit() is called twice: once during the suspend phase and erroneously again during the resume phase. This redundant call leads to a kernel hang or system freeze upon resuming from sleep, as evidenced by kernel trace logs showing a failure in pci_pm_resume and an error code -110, indicating a timeout or device resume failure. The root cause is a race or state management bug in the driver's power management callbacks, causing the NIC to fail to properly reinitialize and thus hang the system. This vulnerability affects Linux kernel versions containing the specified commits and is resolved by removing the redundant call to aq_nic_deinit() on resume. Although no known exploits are reported in the wild, the issue can cause denial of service (DoS) conditions by freezing affected systems during power state transitions.

Potential Impact

For European organizations, the impact of CVE-2022-49624 primarily involves system availability and operational continuity. Organizations using Linux servers or workstations with Aquantia NICs and the affected kernel versions may experience system hangs or crashes when resuming from suspend states, leading to unplanned downtime. This can disrupt critical services, especially in environments relying on power-saving modes or remote management where suspend/resume cycles are common. While this vulnerability does not directly expose confidentiality or integrity risks, the resulting denial of service can affect business operations, incident response, and system reliability. Industries with high uptime requirements such as finance, healthcare, telecommunications, and manufacturing could be particularly impacted. Additionally, the issue may complicate patch management and system maintenance if systems become unresponsive during routine power state changes.

Mitigation Recommendations

To mitigate CVE-2022-49624, European organizations should: 1) Apply the latest Linux kernel updates that include the fix removing the redundant aq_nic_deinit() call on resume. This is the definitive solution to prevent the hang. 2) Identify and inventory systems using Aquantia NICs and verify kernel versions to prioritize patching. 3) Temporarily disable suspend-to-RAM (S3) states on affected systems as a workaround to avoid triggering the bug until patches are applied. This can be done via BIOS/UEFI settings or OS power management configurations. 4) Monitor system logs for pci_pm_resume errors or kernel tracebacks related to the atlantic driver to detect potential occurrences. 5) Test kernel updates in controlled environments before wide deployment to ensure compatibility and stability. 6) Engage with hardware vendors for firmware updates or driver alternatives if applicable. 7) Educate system administrators about the issue to avoid unnecessary troubleshooting delays during resume failures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.421Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd6f9

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 12:54:28 AM

Last updated: 8/14/2025, 7:36:20 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats