CVE-2022-49859: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: lapbether: fix issue of invalid opcode in lapbeth_open() If lapb_register() failed when lapb device goes to up for the first time, the NAPI is not disabled. As a result, the invalid opcode issue is reported when the lapb device goes to up for the second time. The stack info is as follows: [ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442! [ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1958.315979][T11356] RIP: 0010:napi_enable+0x16a/0x1f0 [ 1958.332310][T11356] Call Trace: [ 1958.332817][T11356] <TASK> [ 1958.336135][T11356] lapbeth_open+0x18/0x90 [ 1958.337446][T11356] __dev_open+0x258/0x490 [ 1958.341672][T11356] __dev_change_flags+0x4d4/0x6a0 [ 1958.345325][T11356] dev_change_flags+0x93/0x160 [ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0 [ 1958.346738][T11356] inet_ioctl+0x1c8/0x2d0 [ 1958.349638][T11356] sock_ioctl+0x5d1/0x750 [ 1958.356059][T11356] __x64_sys_ioctl+0x3ec/0x1790 [ 1958.365594][T11356] do_syscall_64+0x35/0x80 [ 1958.366239][T11356] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1958.377381][T11356] </TASK>
AI Analysis
Technical Summary
CVE-2022-49859 is a vulnerability identified in the Linux kernel affecting the lapbether network driver, specifically within the lapbeth_open() function. The root cause stems from improper handling when lapb_register() fails during the initial activation of the lapb device. In this failure scenario, the NAPI (New API for network packet processing) is not properly disabled. Consequently, when the lapb device is brought up a second time, an invalid opcode exception occurs, leading to a kernel BUG and system crash. The vulnerability manifests as an invalid opcode error triggered by napi_enable() being called on an improperly initialized or partially registered device. The stack trace indicates the failure occurs deep within the network core device management code, ultimately causing a kernel panic. This issue can lead to denial of service (DoS) conditions due to kernel crashes when the affected network device is cycled or reinitialized. The vulnerability affects Linux kernel versions containing the specified commit hash 514e1150da9cd8d7978d990a353636cf1a7a87c2, and it has been publicly disclosed without an assigned CVSS score or known exploits in the wild. The lapb (Link Access Procedure, Balanced) protocol is used in some telecommunications and networking environments, so systems utilizing this protocol stack or related network drivers are at risk. The vulnerability requires local administrative privileges to trigger since it involves device state changes and ioctl system calls, but no user interaction is needed beyond that. The issue has been patched in the Linux kernel, although no direct patch links are provided in the source data.
Potential Impact
For European organizations, the primary impact of CVE-2022-49859 is the potential for denial of service on Linux systems running affected kernel versions with lapb network drivers enabled. This could disrupt critical network services, especially in telecom, industrial control, or specialized networking environments that rely on the lapb protocol. Systems experiencing kernel panics may require reboots, leading to downtime and potential loss of availability for network-dependent applications. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be exploited to degrade service reliability. Organizations operating Linux-based infrastructure in sectors such as telecommunications, manufacturing, or research institutions using specialized network stacks may be particularly vulnerable. The lack of known exploits in the wild reduces immediate risk, but unpatched systems remain susceptible to accidental or intentional triggering of the bug. Given the kernel-level nature of the flaw, recovery from crashes may require manual intervention, impacting operational continuity.
Mitigation Recommendations
European organizations should prioritize updating Linux kernels to versions where this vulnerability is patched. Since the vulnerability arises from lapb device initialization failures, administrators should audit their systems to identify usage of lapb or lapbether network drivers and assess whether these are active or required. If lapb functionality is not needed, disabling or blacklisting the lapb module can reduce exposure. For systems requiring lapb, ensure kernel updates are applied promptly from trusted sources. Additionally, implementing kernel crash monitoring and automated recovery mechanisms can minimize downtime caused by unexpected panics. Network device initialization scripts and error handling should be reviewed to prevent repeated failed attempts that could trigger the bug. Organizations should also restrict local administrative access to trusted personnel to reduce the risk of intentional exploitation. Finally, maintaining comprehensive system backups and recovery plans will aid in rapid restoration if crashes occur.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2022-49859: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: lapbether: fix issue of invalid opcode in lapbeth_open() If lapb_register() failed when lapb device goes to up for the first time, the NAPI is not disabled. As a result, the invalid opcode issue is reported when the lapb device goes to up for the second time. The stack info is as follows: [ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442! [ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1958.315979][T11356] RIP: 0010:napi_enable+0x16a/0x1f0 [ 1958.332310][T11356] Call Trace: [ 1958.332817][T11356] <TASK> [ 1958.336135][T11356] lapbeth_open+0x18/0x90 [ 1958.337446][T11356] __dev_open+0x258/0x490 [ 1958.341672][T11356] __dev_change_flags+0x4d4/0x6a0 [ 1958.345325][T11356] dev_change_flags+0x93/0x160 [ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0 [ 1958.346738][T11356] inet_ioctl+0x1c8/0x2d0 [ 1958.349638][T11356] sock_ioctl+0x5d1/0x750 [ 1958.356059][T11356] __x64_sys_ioctl+0x3ec/0x1790 [ 1958.365594][T11356] do_syscall_64+0x35/0x80 [ 1958.366239][T11356] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1958.377381][T11356] </TASK>
AI-Powered Analysis
Technical Analysis
CVE-2022-49859 is a vulnerability identified in the Linux kernel affecting the lapbether network driver, specifically within the lapbeth_open() function. The root cause stems from improper handling when lapb_register() fails during the initial activation of the lapb device. In this failure scenario, the NAPI (New API for network packet processing) is not properly disabled. Consequently, when the lapb device is brought up a second time, an invalid opcode exception occurs, leading to a kernel BUG and system crash. The vulnerability manifests as an invalid opcode error triggered by napi_enable() being called on an improperly initialized or partially registered device. The stack trace indicates the failure occurs deep within the network core device management code, ultimately causing a kernel panic. This issue can lead to denial of service (DoS) conditions due to kernel crashes when the affected network device is cycled or reinitialized. The vulnerability affects Linux kernel versions containing the specified commit hash 514e1150da9cd8d7978d990a353636cf1a7a87c2, and it has been publicly disclosed without an assigned CVSS score or known exploits in the wild. The lapb (Link Access Procedure, Balanced) protocol is used in some telecommunications and networking environments, so systems utilizing this protocol stack or related network drivers are at risk. The vulnerability requires local administrative privileges to trigger since it involves device state changes and ioctl system calls, but no user interaction is needed beyond that. The issue has been patched in the Linux kernel, although no direct patch links are provided in the source data.
Potential Impact
For European organizations, the primary impact of CVE-2022-49859 is the potential for denial of service on Linux systems running affected kernel versions with lapb network drivers enabled. This could disrupt critical network services, especially in telecom, industrial control, or specialized networking environments that rely on the lapb protocol. Systems experiencing kernel panics may require reboots, leading to downtime and potential loss of availability for network-dependent applications. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting instability could be exploited to degrade service reliability. Organizations operating Linux-based infrastructure in sectors such as telecommunications, manufacturing, or research institutions using specialized network stacks may be particularly vulnerable. The lack of known exploits in the wild reduces immediate risk, but unpatched systems remain susceptible to accidental or intentional triggering of the bug. Given the kernel-level nature of the flaw, recovery from crashes may require manual intervention, impacting operational continuity.
Mitigation Recommendations
European organizations should prioritize updating Linux kernels to versions where this vulnerability is patched. Since the vulnerability arises from lapb device initialization failures, administrators should audit their systems to identify usage of lapb or lapbether network drivers and assess whether these are active or required. If lapb functionality is not needed, disabling or blacklisting the lapb module can reduce exposure. For systems requiring lapb, ensure kernel updates are applied promptly from trusted sources. Additionally, implementing kernel crash monitoring and automated recovery mechanisms can minimize downtime caused by unexpected panics. Network device initialization scripts and error handling should be reviewed to prevent repeated failed attempts that could trigger the bug. Organizations should also restrict local administrative access to trusted personnel to reduce the risk of intentional exploitation. Finally, maintaining comprehensive system backups and recovery plans will aid in rapid restoration if crashes occur.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-05-01T14:05:17.235Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4e71
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 2:40:41 AM
Last updated: 8/6/2025, 6:43:56 AM
Views: 13
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.