CVE-2022-49670: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: linux/dim: Fix divide by 0 in RDMA DIM Fix a divide 0 error in rdma_dim_stats_compare() when prev->cpe_ratio == 0. CallTrace: Hardware name: H3C R4900 G3/RS33M2C9S, BIOS 2.00.37P21 03/12/2020 task: ffff880194b78000 task.stack: ffffc90006714000 RIP: 0010:backport_rdma_dim+0x10e/0x240 [mlx_compat] RSP: 0018:ffff880c10e83ec0 EFLAGS: 00010202 RAX: 0000000000002710 RBX: ffff88096cd7f780 RCX: 0000000000000064 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 000000001d7c6c09 R13: ffff88096cd7f780 R14: ffff880b174fe800 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff880c10e80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000a0965b00 CR3: 000000000200a003 CR4: 00000000007606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <IRQ> ib_poll_handler+0x43/0x80 [ib_core] irq_poll_softirq+0xae/0x110 __do_softirq+0xd1/0x28c irq_exit+0xde/0xf0 do_IRQ+0x54/0xe0 common_interrupt+0x8f/0x8f </IRQ> ? cpuidle_enter_state+0xd9/0x2a0 ? cpuidle_enter_state+0xc7/0x2a0 ? do_idle+0x170/0x1d0 ? cpu_startup_entry+0x6f/0x80 ? start_secondary+0x1b9/0x210 ? secondary_startup_64+0xa5/0xb0 Code: 0f 87 e1 00 00 00 8b 4c 24 14 44 8b 43 14 89 c8 4d 63 c8 44 29 c0 99 31 d0 29 d0 31 d2 48 98 48 8d 04 80 48 8d 04 80 48 c1 e0 02 <49> f7 f1 48 83 f8 0a 0f 86 c1 00 00 00 44 39 c1 7f 10 48 89 df RIP: backport_rdma_dim+0x10e/0x240 [mlx_compat] RSP: ffff880c10e83ec0
AI Analysis
Technical Summary
CVE-2022-49670 is a vulnerability identified in the Linux kernel, specifically within the RDMA (Remote Direct Memory Access) DIM (Dynamic Interrupt Moderation) subsystem. The issue arises from a divide-by-zero error in the function rdma_dim_stats_compare(), which occurs when the previous cpe_ratio value is zero. This flaw can cause a kernel panic or system crash due to an unhandled arithmetic exception. The vulnerability is located in the mlx_compat module, which is related to Mellanox device compatibility layers for RDMA. The provided call trace indicates that the error occurs during interrupt handling routines, specifically within the ib_poll_handler and irq_poll_softirq functions. This suggests that the vulnerability could be triggered during RDMA network traffic processing or interrupt moderation activities. The root cause is a missing check for zero before performing a division operation, leading to a critical runtime error. The vulnerability affects specific Linux kernel versions identified by the commit hashes listed, which appear to be backported patches or specific kernel snapshots. No CVSS score has been assigned, and there are no known exploits in the wild at the time of publication. The vulnerability was published on February 26, 2025, and is classified as a kernel-level vulnerability affecting core networking and hardware interaction components.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers and infrastructure utilizing Linux kernels with RDMA capabilities, especially those using Mellanox hardware or compatible drivers. RDMA is commonly employed in high-performance computing, data centers, and enterprise storage networks to enable low-latency, high-throughput communication. A successful exploitation could lead to denial of service (DoS) conditions by crashing affected systems, potentially disrupting critical services and applications relying on RDMA networking. While there is no indication that this vulnerability allows privilege escalation or remote code execution, the resulting system instability could impact availability and operational continuity. Organizations in sectors such as finance, telecommunications, research institutions, and cloud service providers that rely on RDMA-enabled Linux servers may experience service interruptions or degraded performance. The lack of known exploits suggests a low immediate threat, but the kernel-level nature of the flaw means that once exploited, recovery may require system reboots and patching, which could be operationally costly. Confidentiality and integrity impacts are minimal based on current information, but availability impact is moderate to high depending on the criticality of affected systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running kernels with RDMA support, particularly those using Mellanox or mlx_compat drivers. 2) Apply the official Linux kernel patches or updates that fix the divide-by-zero error as soon as they become available from trusted sources or Linux distributions. 3) If immediate patching is not possible, consider disabling RDMA features or the mlx_compat module temporarily to prevent triggering the vulnerability. 4) Monitor system logs and kernel messages for signs of crashes or kernel panics related to RDMA interrupt handling. 5) Implement robust system monitoring and alerting to detect unexpected reboots or service disruptions. 6) Coordinate with hardware vendors for firmware or driver updates that may address related issues. 7) Test patches in staging environments to ensure stability before wide deployment. 8) Maintain up-to-date backups and recovery procedures to minimize downtime in case of exploitation. These steps go beyond generic advice by focusing on RDMA-specific components and operational controls tailored to affected environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2022-49670: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: linux/dim: Fix divide by 0 in RDMA DIM Fix a divide 0 error in rdma_dim_stats_compare() when prev->cpe_ratio == 0. CallTrace: Hardware name: H3C R4900 G3/RS33M2C9S, BIOS 2.00.37P21 03/12/2020 task: ffff880194b78000 task.stack: ffffc90006714000 RIP: 0010:backport_rdma_dim+0x10e/0x240 [mlx_compat] RSP: 0018:ffff880c10e83ec0 EFLAGS: 00010202 RAX: 0000000000002710 RBX: ffff88096cd7f780 RCX: 0000000000000064 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 000000001d7c6c09 R13: ffff88096cd7f780 R14: ffff880b174fe800 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff880c10e80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000a0965b00 CR3: 000000000200a003 CR4: 00000000007606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <IRQ> ib_poll_handler+0x43/0x80 [ib_core] irq_poll_softirq+0xae/0x110 __do_softirq+0xd1/0x28c irq_exit+0xde/0xf0 do_IRQ+0x54/0xe0 common_interrupt+0x8f/0x8f </IRQ> ? cpuidle_enter_state+0xd9/0x2a0 ? cpuidle_enter_state+0xc7/0x2a0 ? do_idle+0x170/0x1d0 ? cpu_startup_entry+0x6f/0x80 ? start_secondary+0x1b9/0x210 ? secondary_startup_64+0xa5/0xb0 Code: 0f 87 e1 00 00 00 8b 4c 24 14 44 8b 43 14 89 c8 4d 63 c8 44 29 c0 99 31 d0 29 d0 31 d2 48 98 48 8d 04 80 48 8d 04 80 48 c1 e0 02 <49> f7 f1 48 83 f8 0a 0f 86 c1 00 00 00 44 39 c1 7f 10 48 89 df RIP: backport_rdma_dim+0x10e/0x240 [mlx_compat] RSP: ffff880c10e83ec0
AI-Powered Analysis
Technical Analysis
CVE-2022-49670 is a vulnerability identified in the Linux kernel, specifically within the RDMA (Remote Direct Memory Access) DIM (Dynamic Interrupt Moderation) subsystem. The issue arises from a divide-by-zero error in the function rdma_dim_stats_compare(), which occurs when the previous cpe_ratio value is zero. This flaw can cause a kernel panic or system crash due to an unhandled arithmetic exception. The vulnerability is located in the mlx_compat module, which is related to Mellanox device compatibility layers for RDMA. The provided call trace indicates that the error occurs during interrupt handling routines, specifically within the ib_poll_handler and irq_poll_softirq functions. This suggests that the vulnerability could be triggered during RDMA network traffic processing or interrupt moderation activities. The root cause is a missing check for zero before performing a division operation, leading to a critical runtime error. The vulnerability affects specific Linux kernel versions identified by the commit hashes listed, which appear to be backported patches or specific kernel snapshots. No CVSS score has been assigned, and there are no known exploits in the wild at the time of publication. The vulnerability was published on February 26, 2025, and is classified as a kernel-level vulnerability affecting core networking and hardware interaction components.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to servers and infrastructure utilizing Linux kernels with RDMA capabilities, especially those using Mellanox hardware or compatible drivers. RDMA is commonly employed in high-performance computing, data centers, and enterprise storage networks to enable low-latency, high-throughput communication. A successful exploitation could lead to denial of service (DoS) conditions by crashing affected systems, potentially disrupting critical services and applications relying on RDMA networking. While there is no indication that this vulnerability allows privilege escalation or remote code execution, the resulting system instability could impact availability and operational continuity. Organizations in sectors such as finance, telecommunications, research institutions, and cloud service providers that rely on RDMA-enabled Linux servers may experience service interruptions or degraded performance. The lack of known exploits suggests a low immediate threat, but the kernel-level nature of the flaw means that once exploited, recovery may require system reboots and patching, which could be operationally costly. Confidentiality and integrity impacts are minimal based on current information, but availability impact is moderate to high depending on the criticality of affected systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory Linux systems running kernels with RDMA support, particularly those using Mellanox or mlx_compat drivers. 2) Apply the official Linux kernel patches or updates that fix the divide-by-zero error as soon as they become available from trusted sources or Linux distributions. 3) If immediate patching is not possible, consider disabling RDMA features or the mlx_compat module temporarily to prevent triggering the vulnerability. 4) Monitor system logs and kernel messages for signs of crashes or kernel panics related to RDMA interrupt handling. 5) Implement robust system monitoring and alerting to detect unexpected reboots or service disruptions. 6) Coordinate with hardware vendors for firmware or driver updates that may address related issues. 7) Test patches in staging environments to ensure stability before wide deployment. 8) Maintain up-to-date backups and recovery procedures to minimize downtime in case of exploitation. These steps go beyond generic advice by focusing on RDMA-specific components and operational controls tailored to affected environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.436Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe47a9
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/29/2025, 11:56:54 PM
Last updated: 8/11/2025, 10:48:26 AM
Views: 18
Related Threats
CVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54458: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.