Memory Corruption in Virtual Function Driver of Linux Kernel
CVE-2022-49722

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
26 February 2025

Summary

A vulnerability in the Linux kernel's Virtual Function (VF) driver was identified, which stems from improper handling of RX/TX queues. When a VF is disabled, it can still have its queues enabled during a reset request, leading to potential memory corruption. This issue may allow the device to erroneously map packets to memory, resulting in a state where memory corruption can occur, potentially causing instability and crashes in the kernel. The issue was addressed by ensuring that VF's RX/TX queues are properly disabled when the VF itself is disabled, thus preventing such scenarios.

Affected Version(s)

Linux ec4f5a436bdf0e5453ad15c4f34a59b9b675ff48 < 1bb8253b1dd44cf004e12c333acc6f25ee286cf3

Linux ec4f5a436bdf0e5453ad15c4f34a59b9b675ff48

Linux 5.5

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.