Skip to main content

CVE-2022-49925: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49925cvecve-2022-49925
Published: Thu May 01 2025 (05/01/2025, 14:11:03 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix null-ptr-deref in ib_core_cleanup() KASAN reported a null-ptr-deref error: KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f] CPU: 1 PID: 379 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:destroy_workqueue+0x2f/0x740 RSP: 0018:ffff888016137df8 EFLAGS: 00000202 ... Call Trace: ib_core_cleanup+0xa/0xa1 [ib_core] __do_sys_delete_module.constprop.0+0x34f/0x5b0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fa1a0d221b7 ... It is because the fail of roce_gid_mgmt_init() is ignored: ib_core_init() roce_gid_mgmt_init() gid_cache_wq = alloc_ordered_workqueue # fail ... ib_core_cleanup() roce_gid_mgmt_cleanup() destroy_workqueue(gid_cache_wq) # destroy an unallocated wq Fix this by catching the fail of roce_gid_mgmt_init() in ib_core_init().

AI-Powered Analysis

AILast updated: 06/29/2025, 20:42:12 UTC

Technical Analysis

CVE-2022-49925 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) core subsystem, specifically within the ib_core module. The issue arises from a null pointer dereference in the ib_core_cleanup() function. The root cause is that the failure of the roce_gid_mgmt_init() function is not properly handled during initialization (ib_core_init()). This function attempts to allocate a workqueue (gid_cache_wq) using alloc_ordered_workqueue, which can fail. If this allocation fails, the pointer gid_cache_wq remains uninitialized (null). Later, during cleanup, the ib_core_cleanup() function calls roce_gid_mgmt_cleanup(), which attempts to destroy the workqueue via destroy_workqueue(gid_cache_wq) without verifying if gid_cache_wq was successfully allocated. This leads to a null pointer dereference, causing a kernel crash or system instability. The vulnerability was detected by KASAN (Kernel Address Sanitizer), which reported the null pointer dereference during the destroy_workqueue call. The fix involves modifying ib_core_init() to properly handle the failure of roce_gid_mgmt_init(), ensuring that cleanup functions do not operate on uninitialized pointers. This vulnerability affects Linux kernel versions containing the specified commit hashes and impacts systems using the RDMA core subsystem, which is commonly used in high-performance computing and data center environments for low-latency networking. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability could lead to system crashes or denial of service on Linux servers that utilize RDMA capabilities, particularly in environments relying on high-performance computing, data centers, or cloud infrastructure where RDMA is used to optimize network performance. The null pointer dereference can cause kernel panics, leading to downtime and potential disruption of critical services. While this vulnerability does not directly expose data or allow privilege escalation, the resulting instability can impact availability and operational continuity. Organizations with workloads dependent on RDMA-enabled Linux servers, such as financial institutions, research centers, and cloud service providers in Europe, may face increased risk of service interruptions. Additionally, the lack of proper error handling could be leveraged in complex attack chains to cause denial of service conditions. However, since exploitation requires triggering kernel code paths related to RDMA initialization and cleanup, the attack surface is somewhat limited to systems with RDMA enabled and configured.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions where this vulnerability is patched. Specifically, they should apply the fix that ensures proper handling of the failure in roce_gid_mgmt_init() during ib_core initialization. System administrators should audit their environments to identify servers running RDMA-enabled Linux kernels and verify if they are using affected versions. If immediate patching is not feasible, organizations can consider disabling RDMA functionality temporarily to mitigate risk, though this may impact performance. Additionally, monitoring kernel logs for KASAN reports or kernel panics related to ib_core_cleanup() can help detect attempts to trigger this vulnerability. Implementing robust kernel crash recovery and high availability configurations will reduce downtime impact. Finally, organizations should maintain strict access controls and monitoring on systems with RDMA capabilities to detect anomalous behavior that might indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.253Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe406c

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:42:12 PM

Last updated: 8/12/2025, 3:13:00 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats