CVE-2022-49625: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: sfc: fix kernel panic when creating VF When creating VFs a kernel panic can happen when calling to efx_ef10_try_update_nic_stats_vf. When releasing a DMA coherent buffer, sometimes, I don't know in what specific circumstances, it has to unmap memory with vunmap. It is disallowed to do that in IRQ context or with BH disabled. Otherwise, we hit this line in vunmap, causing the crash: BUG_ON(in_interrupt()); This patch reenables BH to release the buffer. Log messages when the bug is hit: kernel BUG at mm/vmalloc.c:2727! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 6 PID: 1462 Comm: NetworkManager Kdump: loaded Tainted: G I --------- --- 5.14.0-119.el9.x86_64 #1 Hardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020 RIP: 0010:vunmap+0x2e/0x30 ...skip... Call Trace: __iommu_dma_free+0x96/0x100 efx_nic_free_buffer+0x2b/0x40 [sfc] efx_ef10_try_update_nic_stats_vf+0x14a/0x1c0 [sfc] efx_ef10_update_stats_vf+0x18/0x40 [sfc] efx_start_all+0x15e/0x1d0 [sfc] efx_net_open+0x5a/0xe0 [sfc] __dev_open+0xe7/0x1a0 __dev_change_flags+0x1d7/0x240 dev_change_flags+0x21/0x60 ...skip...
AI Analysis
Technical Summary
CVE-2022-49625 is a vulnerability in the Linux kernel's sfc driver, specifically related to the handling of Virtual Functions (VFs) in network interface cards (NICs) using the Solarflare sfc driver. The issue arises when creating VFs, where a kernel panic can occur during the execution of the function efx_ef10_try_update_nic_stats_vf. The root cause is linked to improper memory unmapping during the release of DMA coherent buffers. In certain contexts, the kernel attempts to unmap memory using vunmap while in an interrupt context or with bottom halves (BH) disabled, which is disallowed and triggers a kernel BUG at mm/vmalloc.c:2727. This results in a system crash (kernel panic) due to the BUG_ON(in_interrupt()) check failing. The patch for this vulnerability re-enables BH during buffer release to prevent the panic. The vulnerability affects Linux kernel versions that include the vulnerable sfc driver code, with the example given being kernel version 5.14.0-119.el9.x86_64. The issue is triggered when the kernel tries to update NIC statistics for VFs, which is part of network device initialization and operation. The vulnerability does not require user interaction but does require privileged access to trigger the creation of VFs. No known exploits are reported in the wild as of the published date. The vulnerability impacts system stability and availability by causing kernel panics, which can lead to denial of service (DoS) conditions on affected systems running the vulnerable Linux kernel with the sfc driver enabled and using VFs.
Potential Impact
For European organizations, the primary impact of CVE-2022-49625 is on system availability and reliability. Organizations using Linux servers with Solarflare NICs that support VFs may experience unexpected kernel panics leading to system crashes and potential service outages. This can disrupt critical network infrastructure, especially in data centers, cloud service providers, and enterprises relying on virtualized network functions or SR-IOV (Single Root I/O Virtualization) capabilities. The denial of service caused by kernel panics could affect business continuity, especially for industries with high availability requirements such as finance, telecommunications, and public sector services. Additionally, repeated crashes could increase operational costs due to system downtime and troubleshooting efforts. Since the vulnerability requires privileged access to trigger, the risk of remote exploitation is low unless attackers have already gained elevated privileges. However, insider threats or compromised administrative accounts could exploit this to cause disruption. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should apply the following specific mitigations: 1) Update Linux kernels to versions that include the patch for CVE-2022-49625 as soon as they become available from their Linux distribution vendors. 2) For environments using Solarflare NICs with VF capabilities, temporarily disable VF creation or SR-IOV features if patching is not immediately possible to prevent triggering the vulnerability. 3) Monitor system logs for kernel panic messages referencing vunmap or sfc driver errors to detect potential exploitation or triggering of the bug. 4) Restrict administrative access to systems with vulnerable kernels to trusted personnel only and enforce strong access controls and auditing to prevent unauthorized VF creation. 5) Implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel panics. 6) Coordinate with hardware vendors and Linux distribution maintainers to receive timely updates and advisories related to this vulnerability. 7) Conduct thorough testing of kernel updates in staging environments before deployment to production to ensure stability and compatibility.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2022-49625: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: sfc: fix kernel panic when creating VF When creating VFs a kernel panic can happen when calling to efx_ef10_try_update_nic_stats_vf. When releasing a DMA coherent buffer, sometimes, I don't know in what specific circumstances, it has to unmap memory with vunmap. It is disallowed to do that in IRQ context or with BH disabled. Otherwise, we hit this line in vunmap, causing the crash: BUG_ON(in_interrupt()); This patch reenables BH to release the buffer. Log messages when the bug is hit: kernel BUG at mm/vmalloc.c:2727! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 6 PID: 1462 Comm: NetworkManager Kdump: loaded Tainted: G I --------- --- 5.14.0-119.el9.x86_64 #1 Hardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020 RIP: 0010:vunmap+0x2e/0x30 ...skip... Call Trace: __iommu_dma_free+0x96/0x100 efx_nic_free_buffer+0x2b/0x40 [sfc] efx_ef10_try_update_nic_stats_vf+0x14a/0x1c0 [sfc] efx_ef10_update_stats_vf+0x18/0x40 [sfc] efx_start_all+0x15e/0x1d0 [sfc] efx_net_open+0x5a/0xe0 [sfc] __dev_open+0xe7/0x1a0 __dev_change_flags+0x1d7/0x240 dev_change_flags+0x21/0x60 ...skip...
AI-Powered Analysis
Technical Analysis
CVE-2022-49625 is a vulnerability in the Linux kernel's sfc driver, specifically related to the handling of Virtual Functions (VFs) in network interface cards (NICs) using the Solarflare sfc driver. The issue arises when creating VFs, where a kernel panic can occur during the execution of the function efx_ef10_try_update_nic_stats_vf. The root cause is linked to improper memory unmapping during the release of DMA coherent buffers. In certain contexts, the kernel attempts to unmap memory using vunmap while in an interrupt context or with bottom halves (BH) disabled, which is disallowed and triggers a kernel BUG at mm/vmalloc.c:2727. This results in a system crash (kernel panic) due to the BUG_ON(in_interrupt()) check failing. The patch for this vulnerability re-enables BH during buffer release to prevent the panic. The vulnerability affects Linux kernel versions that include the vulnerable sfc driver code, with the example given being kernel version 5.14.0-119.el9.x86_64. The issue is triggered when the kernel tries to update NIC statistics for VFs, which is part of network device initialization and operation. The vulnerability does not require user interaction but does require privileged access to trigger the creation of VFs. No known exploits are reported in the wild as of the published date. The vulnerability impacts system stability and availability by causing kernel panics, which can lead to denial of service (DoS) conditions on affected systems running the vulnerable Linux kernel with the sfc driver enabled and using VFs.
Potential Impact
For European organizations, the primary impact of CVE-2022-49625 is on system availability and reliability. Organizations using Linux servers with Solarflare NICs that support VFs may experience unexpected kernel panics leading to system crashes and potential service outages. This can disrupt critical network infrastructure, especially in data centers, cloud service providers, and enterprises relying on virtualized network functions or SR-IOV (Single Root I/O Virtualization) capabilities. The denial of service caused by kernel panics could affect business continuity, especially for industries with high availability requirements such as finance, telecommunications, and public sector services. Additionally, repeated crashes could increase operational costs due to system downtime and troubleshooting efforts. Since the vulnerability requires privileged access to trigger, the risk of remote exploitation is low unless attackers have already gained elevated privileges. However, insider threats or compromised administrative accounts could exploit this to cause disruption. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.
Mitigation Recommendations
European organizations should apply the following specific mitigations: 1) Update Linux kernels to versions that include the patch for CVE-2022-49625 as soon as they become available from their Linux distribution vendors. 2) For environments using Solarflare NICs with VF capabilities, temporarily disable VF creation or SR-IOV features if patching is not immediately possible to prevent triggering the vulnerability. 3) Monitor system logs for kernel panic messages referencing vunmap or sfc driver errors to detect potential exploitation or triggering of the bug. 4) Restrict administrative access to systems with vulnerable kernels to trusted personnel only and enforce strong access controls and auditing to prevent unauthorized VF creation. 5) Implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel panics. 6) Coordinate with hardware vendors and Linux distribution maintainers to receive timely updates and advisories related to this vulnerability. 7) Conduct thorough testing of kernel updates in staging environments before deployment to production to ensure stability and compatibility.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.421Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4667
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/29/2025, 11:26:04 PM
Last updated: 8/1/2025, 12:06:03 AM
Views: 11
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.