Executive Summary

Informations
Name CVE-2022-48941 First vendor Publication 2024-08-22
Vendor Cve Last vendor Modification 2024-08-22

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 4.7
Base Score 4.7 Environmental Score 4.7
impact SubScore 3.6 Temporal Score 4.7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ice: fix concurrent reset and removal of VFs

Commit c503e63200c6 ("ice: Stop processing VF messages during teardown") introduced a driver state flag, ICE_VF_DEINIT_IN_PROGRESS, which is intended to prevent some issues with concurrently handling messages from VFs while tearing down the VFs.

This change was motivated by crashes caused while tearing down and bringing up VFs in rapid succession.

It turns out that the fix actually introduces issues with the VF driver caused because the PF no longer responds to any messages sent by the VF during its .remove routine. This results in the VF potentially removing its DMA memory before the PF has shut down the device queues.

Additionally, the fix doesn't actually resolve concurrency issues within the ice driver. It is possible for a VF to initiate a reset just prior to the ice driver removing VFs. This can result in the remove task concurrently operating while the VF is being reset. This results in similar memory corruption and panics purportedly fixed by that commit.

Fix this concurrency at its root by protecting both the reset and removal flows using the existing VF cfg_lock. This ensures that we cannot remove the VF while any outstanding critical tasks such as a virtchnl message or a reset are occurring.

This locking change also fixes the root cause originally fixed by commit c503e63200c6 ("ice: Stop processing VF messages during teardown"), so we can simply revert it.

Note that I kept these two changes together because simply reverting the original commit alone would leave the driver vulnerable to worse race conditions.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48941

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-362 Race Condition

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 3504

Sources (Detail)

https://git.kernel.org/stable/c/05ae1f0fe9c6c5ead08b306e665763a352d20716
https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586
https://git.kernel.org/stable/c/3c805fce07c9dbc47d8a9129c7c5458025951957
https://git.kernel.org/stable/c/fadead80fe4c033b5e514fcbadd20b55c4494112
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2025-01-08 02:47:33
  • Multiple Updates
2025-01-07 02:47:09
  • Multiple Updates
2024-12-25 02:45:56
  • Multiple Updates
2024-12-12 02:48:50
  • Multiple Updates
2024-11-22 02:46:14
  • Multiple Updates
2024-11-20 02:43:38
  • Multiple Updates
2024-11-14 02:43:30
  • Multiple Updates
2024-11-09 02:44:09
  • Multiple Updates
2024-10-26 02:41:55
  • Multiple Updates
2024-10-25 02:43:41
  • Multiple Updates
2024-10-23 02:43:05
  • Multiple Updates
2024-10-03 02:39:08
  • Multiple Updates
2024-10-02 02:37:32
  • Multiple Updates
2024-09-04 02:36:48
  • Multiple Updates
2024-08-23 02:48:06
  • Multiple Updates
2024-08-23 02:35:12
  • Multiple Updates
2024-08-23 00:27:30
  • Multiple Updates
2024-08-22 17:27:24
  • Multiple Updates
2024-08-22 09:27:25
  • First insertion