CVE-2022-49654: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: dsa: qca8k: reset cpu port on MTU change It was discovered that the Documentation lacks of a fundamental detail on how to correctly change the MAX_FRAME_SIZE of the switch. In fact if the MAX_FRAME_SIZE is changed while the cpu port is on, the switch panics and cease to send any packet. This cause the mgmt ethernet system to not receive any packet (the slow fallback still works) and makes the device not reachable. To recover from this a switch reset is required. To correctly handle this, turn off the cpu ports before changing the MAX_FRAME_SIZE and turn on again after the value is applied.
AI Analysis
Technical Summary
CVE-2022-49654 is a vulnerability in the Linux kernel's Distributed Switch Architecture (DSA) driver for the Qualcomm Atheros qca8k switch. The issue arises when the MAX_FRAME_SIZE (Maximum Transmission Unit - MTU) of the switch is changed while the CPU port is still active. The Linux kernel documentation lacked clear instructions on the correct procedure to change the MAX_FRAME_SIZE, which should involve disabling the CPU port before applying the change and re-enabling it afterward. If this procedure is not followed, changing the MAX_FRAME_SIZE causes the switch to panic and stop sending packets. This results in the management Ethernet interface becoming unresponsive, as it no longer receives packets, although a slow fallback mechanism may still function. The device becomes unreachable over the network, requiring a manual switch reset to recover. This vulnerability is rooted in improper handling of MTU changes on the qca8k switch driver and affects specific Linux kernel versions identified by the commit hash f58d2598cf70d41f73e761b62a114d2e8f94a676. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The root cause is a lack of proper state management during MTU changes on the CPU port, leading to a denial of service condition due to network unavailability.
Potential Impact
For European organizations relying on Linux-based network devices or embedded systems using the Qualcomm Atheros qca8k switch driver, this vulnerability can cause network outages and loss of remote management capabilities. The inability to receive packets on the management Ethernet interface can lead to operational disruptions, especially in environments where remote access and network availability are critical, such as data centers, telecom infrastructure, and industrial control systems. The denial of service caused by the switch panic may require physical intervention to reset the device, increasing downtime and operational costs. While the vulnerability does not appear to allow privilege escalation or data exfiltration, the loss of network connectivity can impact business continuity and incident response capabilities. European organizations with automated network management or orchestration systems that dynamically adjust MTU settings may be particularly vulnerable if the CPU port is not properly disabled during MTU changes. The absence of known exploits reduces immediate risk, but the vulnerability's nature means that misconfiguration or software updates could inadvertently trigger outages.
Mitigation Recommendations
To mitigate this vulnerability, organizations should ensure that any changes to the MAX_FRAME_SIZE (MTU) on switches using the qca8k driver are performed by first disabling the CPU port, applying the MTU change, and then re-enabling the CPU port. This procedure prevents the switch from panicking and losing packet transmission capability. Network administrators should audit their configuration management and automation scripts to verify compliance with this sequence. Applying the latest Linux kernel patches or updates that address this issue is recommended once available. In environments where patching is delayed, monitoring network device logs for switch panics and implementing alerting can help detect incidents early. Additionally, maintaining physical access or out-of-band management paths to affected devices can reduce downtime in case a reset is required. Vendors and integrators should update their documentation and training materials to emphasize the correct procedure for MTU changes on affected switches. Finally, testing MTU changes in controlled environments before deployment can prevent unexpected outages.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49654: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: dsa: qca8k: reset cpu port on MTU change It was discovered that the Documentation lacks of a fundamental detail on how to correctly change the MAX_FRAME_SIZE of the switch. In fact if the MAX_FRAME_SIZE is changed while the cpu port is on, the switch panics and cease to send any packet. This cause the mgmt ethernet system to not receive any packet (the slow fallback still works) and makes the device not reachable. To recover from this a switch reset is required. To correctly handle this, turn off the cpu ports before changing the MAX_FRAME_SIZE and turn on again after the value is applied.
AI-Powered Analysis
Technical Analysis
CVE-2022-49654 is a vulnerability in the Linux kernel's Distributed Switch Architecture (DSA) driver for the Qualcomm Atheros qca8k switch. The issue arises when the MAX_FRAME_SIZE (Maximum Transmission Unit - MTU) of the switch is changed while the CPU port is still active. The Linux kernel documentation lacked clear instructions on the correct procedure to change the MAX_FRAME_SIZE, which should involve disabling the CPU port before applying the change and re-enabling it afterward. If this procedure is not followed, changing the MAX_FRAME_SIZE causes the switch to panic and stop sending packets. This results in the management Ethernet interface becoming unresponsive, as it no longer receives packets, although a slow fallback mechanism may still function. The device becomes unreachable over the network, requiring a manual switch reset to recover. This vulnerability is rooted in improper handling of MTU changes on the qca8k switch driver and affects specific Linux kernel versions identified by the commit hash f58d2598cf70d41f73e761b62a114d2e8f94a676. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The root cause is a lack of proper state management during MTU changes on the CPU port, leading to a denial of service condition due to network unavailability.
Potential Impact
For European organizations relying on Linux-based network devices or embedded systems using the Qualcomm Atheros qca8k switch driver, this vulnerability can cause network outages and loss of remote management capabilities. The inability to receive packets on the management Ethernet interface can lead to operational disruptions, especially in environments where remote access and network availability are critical, such as data centers, telecom infrastructure, and industrial control systems. The denial of service caused by the switch panic may require physical intervention to reset the device, increasing downtime and operational costs. While the vulnerability does not appear to allow privilege escalation or data exfiltration, the loss of network connectivity can impact business continuity and incident response capabilities. European organizations with automated network management or orchestration systems that dynamically adjust MTU settings may be particularly vulnerable if the CPU port is not properly disabled during MTU changes. The absence of known exploits reduces immediate risk, but the vulnerability's nature means that misconfiguration or software updates could inadvertently trigger outages.
Mitigation Recommendations
To mitigate this vulnerability, organizations should ensure that any changes to the MAX_FRAME_SIZE (MTU) on switches using the qca8k driver are performed by first disabling the CPU port, applying the MTU change, and then re-enabling the CPU port. This procedure prevents the switch from panicking and losing packet transmission capability. Network administrators should audit their configuration management and automation scripts to verify compliance with this sequence. Applying the latest Linux kernel patches or updates that address this issue is recommended once available. In environments where patching is delayed, monitoring network device logs for switch panics and implementing alerting can help detect incidents early. Additionally, maintaining physical access or out-of-band management paths to affected devices can reduce downtime in case a reset is required. Vendors and integrators should update their documentation and training materials to emphasize the correct procedure for MTU changes on affected switches. Finally, testing MTU changes in controlled environments before deployment can prevent unexpected outages.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.433Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4750
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/29/2025, 11:55:02 PM
Last updated: 7/26/2025, 10:43:31 AM
Views: 10
Related Threats
CVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighCVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighCVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.