CVE-2022-49625

In the Linux kernel, the following vulnerability has been resolved: sfc: fix kernel panic when creating VF When creating VFs a kernel panic can happen when calling to efx_ef10_try_update_nic_stats_vf. When releasing a DMA coherent buffer, sometimes, I don't know in what specific circumstances, it has to unmap memory with vunmap. It is disallowed to do that in IRQ context or with BH disabled. Otherwise, we hit this line in vunmap, causing the crash: BUG_ON(in_interrupt()); This patch reenables BH to release the buffer. Log messages when the bug is hit: kernel BUG at mm/vmalloc.c:2727! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 6 PID: 1462 Comm: NetworkManager Kdump: loaded Tainted: G I --------- --- 5.14.0-119.el9.x86_64 #1 Hardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020 RIP: 0010:vunmap+0x2e/0x30 ...skip... Call Trace: __iommu_dma_free+0x96/0x100 efx_nic_free_buffer+0x2b/0x40 [sfc] efx_ef10_try_update_nic_stats_vf+0x14a/0x1c0 [sfc] efx_ef10_update_stats_vf+0x18/0x40 [sfc] efx_start_all+0x15e/0x1d0 [sfc] efx_net_open+0x5a/0xe0 [sfc] __dev_open+0xe7/0x1a0 __dev_change_flags+0x1d7/0x240 dev_change_flags+0x21/0x60 ...skip...
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*

History

23 Oct 2025, 12:09

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-476
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sfc: corregir pánico del kernel al crear VF Al crear VF, puede ocurrir un pánico del kernel al llamar a efx_ef10_try_update_nic_stats_vf. Al liberar un búfer coherente DMA, a veces, no sé en qué circunstancias específicas, tiene que desasignar la memoria con vunmap. No está permitido hacer eso en el contexto de IRQ o con BH deshabilitado. De lo contrario, llegamos a esta línea en vunmap, lo que provoca el bloqueo: BUG_ON(in_interrupt()); Este parche vuelve a habilitar BH para liberar el búfer. Mensajes de registro cuando se detecta el error: kernel BUG en mm/vmalloc.c:2727! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 6 PID: 1462 Comm: NetworkManager Kdump: loaded Tainted: G I --------- --- 5.14.0-119.el9.x86_64 #1 Hardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020 RIP: 0010:vunmap+0x2e/0x30 ...skip... Call Trace: __iommu_dma_free+0x96/0x100 efx_nic_free_buffer+0x2b/0x40 [sfc] efx_ef10_try_update_nic_stats_vf+0x14a/0x1c0 [sfc] efx_ef10_update_stats_vf+0x18/0x40 [sfc] efx_start_all+0x15e/0x1d0 [sfc] efx_net_open+0x5a/0xe0 [sfc] __dev_open+0xe7/0x1a0 __dev_change_flags+0x1d7/0x240 dev_change_flags+0x21/0x60 ...skip...
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/16662524ec5da801fb78a1afcaf6e782f1cf103a - () https://git.kernel.org/stable/c/16662524ec5da801fb78a1afcaf6e782f1cf103a - Patch
References () https://git.kernel.org/stable/c/68e5f32f0de9594629ff9e599294d9801c6187de - () https://git.kernel.org/stable/c/68e5f32f0de9594629ff9e599294d9801c6187de - Patch
References () https://git.kernel.org/stable/c/82bcb730f856086f033e6c04082eb4503d4c2fa4 - () https://git.kernel.org/stable/c/82bcb730f856086f033e6c04082eb4503d4c2fa4 - Patch
References () https://git.kernel.org/stable/c/ada74c5539eba06cf8b47d068f92e0b3963a9a6e - () https://git.kernel.org/stable/c/ada74c5539eba06cf8b47d068f92e0b3963a9a6e - Patch
References () https://git.kernel.org/stable/c/b82e4ad58a7fb72456503958a93060f87896e629 - () https://git.kernel.org/stable/c/b82e4ad58a7fb72456503958a93060f87896e629 - Patch
References () https://git.kernel.org/stable/c/b9072305270579a9d6afc9b926166231e5b1a7c8 - () https://git.kernel.org/stable/c/b9072305270579a9d6afc9b926166231e5b1a7c8 - Patch
References () https://git.kernel.org/stable/c/d9840212a9c00507347c703f4fdeda16400407e0 - () https://git.kernel.org/stable/c/d9840212a9c00507347c703f4fdeda16400407e0 - Patch
References () https://git.kernel.org/stable/c/da346adcf5573fd8663cabfdfe8371009629a906 - () https://git.kernel.org/stable/c/da346adcf5573fd8663cabfdfe8371009629a906 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-23 12:09


NVD link : CVE-2022-49625

Mitre link : CVE-2022-49625

CVE.ORG link : CVE-2022-49625


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference