CVE-2022-49925: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix null-ptr-deref in ib_core_cleanup() KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f] CPU: 1 PID: 379 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:destroy_workqueue+0x2f/0x740 RSP: 0018:ffff888016137df8 EFLAGS: 00000202 ... Call Trace: ib_core_cleanup+0xa/0xa1 [ib_core] __do_sys_delete_module.constprop.0+0x34f/0x5b0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fa1a0d221b7 ... It is because the fail of roce_gid_mgmt_init() is ignored: ib_core_init() roce_gid_mgmt_init() gid_cache_wq = alloc_ordered_workqueue # fail ... ib_core_cleanup() roce_gid_mgmt_cleanup() destroy_workqueue(gid_cache_wq) # destroy an unallocated wq Fix this by catching the fail of roce_gid_mgmt_init() in ib_core_init().
AI Analysis
Technical Summary
CVE-2022-49925 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) core subsystem, specifically within the ib_core module. The issue arises from a null pointer dereference in the ib_core_cleanup() function. The root cause is that the failure of the roce_gid_mgmt_init() function is not properly handled during initialization (ib_core_init()). This function attempts to allocate a workqueue (gid_cache_wq) using alloc_ordered_workqueue, which can fail. If this allocation fails, the pointer gid_cache_wq remains uninitialized (null). Later, during cleanup, the ib_core_cleanup() function calls roce_gid_mgmt_cleanup(), which attempts to destroy the workqueue via destroy_workqueue(gid_cache_wq) without verifying if gid_cache_wq was successfully allocated. This leads to a null pointer dereference, causing a kernel crash or system instability. The vulnerability was detected by KASAN (Kernel Address Sanitizer), which reported the null pointer dereference during the destroy_workqueue call. The fix involves modifying ib_core_init() to properly handle the failure of roce_gid_mgmt_init(), ensuring that cleanup functions do not operate on uninitialized pointers. This vulnerability affects Linux kernel versions containing the specified commit hashes and impacts systems using the RDMA core subsystem, which is commonly used in high-performance computing and data center environments for low-latency networking. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability could lead to system crashes or denial of service on Linux servers that utilize RDMA capabilities, particularly in environments relying on high-performance computing, data centers, or cloud infrastructure where RDMA is used to optimize network performance. The null pointer dereference can cause kernel panics, leading to downtime and potential disruption of critical services. While this vulnerability does not directly expose data or allow privilege escalation, the resulting instability can impact availability and operational continuity. Organizations with workloads dependent on RDMA-enabled Linux servers, such as financial institutions, research centers, and cloud service providers in Europe, may face increased risk of service interruptions. Additionally, the lack of proper error handling could be leveraged in complex attack chains to cause denial of service conditions. However, since exploitation requires triggering kernel code paths related to RDMA initialization and cleanup, the attack surface is somewhat limited to systems with RDMA enabled and configured.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Specifically, they should apply the fix that ensures proper handling of the failure in roce_gid_mgmt_init() during ib_core initialization. System administrators should audit their environments to identify servers running RDMA-enabled Linux kernels and verify if they are using affected versions. If immediate patching is not feasible, organizations can consider disabling RDMA functionality temporarily to mitigate risk, though this may impact performance. Additionally, monitoring kernel logs for KASAN reports or kernel panics related to ib_core_cleanup() can help detect attempts to trigger this vulnerability. Implementing robust kernel crash recovery and high availability configurations will reduce downtime impact. Finally, organizations should maintain strict access controls and monitoring on systems with RDMA capabilities to detect anomalous behavior that might indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2022-49925: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix null-ptr-deref in ib_core_cleanup() KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f] CPU: 1 PID: 379 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:destroy_workqueue+0x2f/0x740 RSP: 0018:ffff888016137df8 EFLAGS: 00000202 ... Call Trace: ib_core_cleanup+0xa/0xa1 [ib_core] __do_sys_delete_module.constprop.0+0x34f/0x5b0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fa1a0d221b7 ... It is because the fail of roce_gid_mgmt_init() is ignored: ib_core_init() roce_gid_mgmt_init() gid_cache_wq = alloc_ordered_workqueue # fail ... ib_core_cleanup() roce_gid_mgmt_cleanup() destroy_workqueue(gid_cache_wq) # destroy an unallocated wq Fix this by catching the fail of roce_gid_mgmt_init() in ib_core_init().
AI-Powered Analysis
Technical Analysis
CVE-2022-49925 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) core subsystem, specifically within the ib_core module. The issue arises from a null pointer dereference in the ib_core_cleanup() function. The root cause is that the failure of the roce_gid_mgmt_init() function is not properly handled during initialization (ib_core_init()). This function attempts to allocate a workqueue (gid_cache_wq) using alloc_ordered_workqueue, which can fail. If this allocation fails, the pointer gid_cache_wq remains uninitialized (null). Later, during cleanup, the ib_core_cleanup() function calls roce_gid_mgmt_cleanup(), which attempts to destroy the workqueue via destroy_workqueue(gid_cache_wq) without verifying if gid_cache_wq was successfully allocated. This leads to a null pointer dereference, causing a kernel crash or system instability. The vulnerability was detected by KASAN (Kernel Address Sanitizer), which reported the null pointer dereference during the destroy_workqueue call. The fix involves modifying ib_core_init() to properly handle the failure of roce_gid_mgmt_init(), ensuring that cleanup functions do not operate on uninitialized pointers. This vulnerability affects Linux kernel versions containing the specified commit hashes and impacts systems using the RDMA core subsystem, which is commonly used in high-performance computing and data center environments for low-latency networking. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability could lead to system crashes or denial of service on Linux servers that utilize RDMA capabilities, particularly in environments relying on high-performance computing, data centers, or cloud infrastructure where RDMA is used to optimize network performance. The null pointer dereference can cause kernel panics, leading to downtime and potential disruption of critical services. While this vulnerability does not directly expose data or allow privilege escalation, the resulting instability can impact availability and operational continuity. Organizations with workloads dependent on RDMA-enabled Linux servers, such as financial institutions, research centers, and cloud service providers in Europe, may face increased risk of service interruptions. Additionally, the lack of proper error handling could be leveraged in complex attack chains to cause denial of service conditions. However, since exploitation requires triggering kernel code paths related to RDMA initialization and cleanup, the attack surface is somewhat limited to systems with RDMA enabled and configured.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Specifically, they should apply the fix that ensures proper handling of the failure in roce_gid_mgmt_init() during ib_core initialization. System administrators should audit their environments to identify servers running RDMA-enabled Linux kernels and verify if they are using affected versions. If immediate patching is not feasible, organizations can consider disabling RDMA functionality temporarily to mitigate risk, though this may impact performance. Additionally, monitoring kernel logs for KASAN reports or kernel panics related to ib_core_cleanup() can help detect attempts to trigger this vulnerability. Implementing robust kernel crash recovery and high availability configurations will reduce downtime impact. Finally, organizations should maintain strict access controls and monitoring on systems with RDMA capabilities to detect anomalous behavior that might indicate exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-05-01T14:05:17.253Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe406c
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 8:42:12 PM
Last updated: 8/12/2025, 3:13:00 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.