Skip to main content

CVE-2022-49859: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49859cvecve-2022-49859
Published: Thu May 01 2025 (05/01/2025, 14:10:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: lapbether: fix issue of invalid opcode in lapbeth_open() If lapb_register() failed when lapb device goes to up for the first time, the NAPI is not disabled. As a result, the invalid opcode issue is reported when the lapb device goes to up for the second time. The stack info is as follows: [ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442! [ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1958.315979][T11356] RIP: 0010:napi_enable+0x16a/0x1f0 [ 1958.332310][T11356] Call Trace: [ 1958.332817][T11356] <TASK> [ 1958.336135][T11356] lapbeth_open+0x18/0x90 [ 1958.337446][T11356] __dev_open+0x258/0x490 [ 1958.341672][T11356] __dev_change_flags+0x4d4/0x6a0 [ 1958.345325][T11356] dev_change_flags+0x93/0x160 [ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0 [ 1958.346738][T11356] inet_ioctl+0x1c8/0x2d0 [ 1958.349638][T11356] sock_ioctl+0x5d1/0x750 [ 1958.356059][T11356] __x64_sys_ioctl+0x3ec/0x1790 [ 1958.365594][T11356] do_syscall_64+0x35/0x80 [ 1958.366239][T11356] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1958.377381][T11356] </TASK>

AI-Powered Analysis

AILast updated: 06/30/2025, 02:40:41 UTC

Technical Analysis

CVE-2022-49859 is a vulnerability identified in the Linux kernel affecting the lapbether network driver, specifically within the lapbeth_open() function. The root cause stems from improper handling when lapb_register() fails during the initial activation of the lapb device. In this failure scenario, the NAPI (New API for network packet processing) is not properly disabled. Consequently, when the lapb device is brought up a second time, an invalid opcode exception occurs, leading to a kernel BUG and system crash. The vulnerability manifests as an invalid opcode error triggered by napi_enable() being called on an improperly initialized or partially registered device. The stack trace indicates the failure occurs deep within the network core device management code, ultimately causing a kernel panic. This issue can lead to denial of service (DoS) conditions due to kernel crashes when the affected network device is cycled or reinitialized. The vulnerability affects Linux kernel versions containing the specified commit hash 514e1150da9cd8d7978d990a353636cf1a7a87c2, and it has been publicly disclosed without an assigned CVSS score or known exploits in the wild. The lapb (Link Access Procedure, Balanced) protocol is used in some telecommunications and networking environments, so systems utilizing this protocol stack or related network drivers are at risk. The vulnerability requires local administrative privileges to trigger since it involves device state changes and ioctl system calls, but no user interaction is needed beyond that. The issue has been patched in the Linux kernel, although no direct patch links are provided in the source data.

Potential Impact

For European organizations, the primary impact of CVE-2022-49859 is the potential for denial of service on Linux systems running affected kernel versions with lapb network drivers enabled. This could disrupt critical network services, especially in telecom, industrial control, or specialized networking environments that rely on the lapb protocol. Systems experiencing kernel panics may require reboots, leading to downtime and potential loss of availability for network-dependent applications. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be exploited to degrade service reliability. Organizations operating Linux-based infrastructure in sectors such as telecommunications, manufacturing, or research institutions using specialized network stacks may be particularly vulnerable. The lack of known exploits in the wild reduces immediate risk, but unpatched systems remain susceptible to accidental or intentional triggering of the bug. Given the kernel-level nature of the flaw, recovery from crashes may require manual intervention, impacting operational continuity.

Mitigation Recommendations

European organizations should prioritize updating Linux kernels to versions where this vulnerability is patched. Since the vulnerability arises from lapb device initialization failures, administrators should audit their systems to identify usage of lapb or lapbether network drivers and assess whether these are active or required. If lapb functionality is not needed, disabling or blacklisting the lapb module can reduce exposure. For systems requiring lapb, ensure kernel updates are applied promptly from trusted sources. Additionally, implementing kernel crash monitoring and automated recovery mechanisms can minimize downtime caused by unexpected panics. Network device initialization scripts and error handling should be reviewed to prevent repeated failed attempts that could trigger the bug. Organizations should also restrict local administrative access to trusted personnel to reduce the risk of intentional exploitation. Finally, maintaining comprehensive system backups and recovery plans will aid in rapid restoration if crashes occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.235Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4e71

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 2:40:41 AM

Last updated: 8/6/2025, 6:43:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats