CVE-2022-48652

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
28/04/2024
Last modified:
19/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: Fix crash by keep old cfg when update TCs more than queues<br /> <br /> There are problems if allocated queues less than Traffic Classes.<br /> <br /> Commit a632b2a4c920 ("ice: ethtool: Prohibit improper channel config<br /> for DCB") already disallow setting less queues than TCs.<br /> <br /> Another case is if we first set less queues, and later update more TCs<br /> config due to LLDP, ice_vsi_cfg_tc() will failed but left dirty<br /> num_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.<br /> <br /> [ 95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.<br /> [ 95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!<br /> [ 95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0<br /> [ 95.969621] general protection fault: 0000 [#1] SMP NOPTI<br /> [ 95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G U W O --------- -t - 4.18.0 #1<br /> [ 95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021<br /> [ 95.969992] RIP: 0010:devm_kmalloc+0xa/0x60<br /> [ 95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c<br /> [ 95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206<br /> [ 95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0<br /> [ 95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200<br /> [ 95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000<br /> [ 95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100<br /> [ 95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460<br /> [ 95.970981] FS: 00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000<br /> [ 95.971108] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0<br /> [ 95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> [ 95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> [ 95.971530] PKRU: 55555554<br /> [ 95.971573] Call Trace:<br /> [ 95.971622] ice_setup_rx_ring+0x39/0x110 [ice]<br /> [ 95.971695] ice_vsi_setup_rx_rings+0x54/0x90 [ice]<br /> [ 95.971774] ice_vsi_open+0x25/0x120 [ice]<br /> [ 95.971843] ice_open_internal+0xb8/0x1f0 [ice]<br /> [ 95.971919] ice_ena_vsi+0x4f/0xd0 [ice]<br /> [ 95.971987] ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]<br /> [ 95.972082] ice_pf_dcb_cfg+0x29a/0x380 [ice]<br /> [ 95.972154] ice_dcbnl_setets+0x174/0x1b0 [ice]<br /> [ 95.972220] dcbnl_ieee_set+0x89/0x230<br /> [ 95.972279] ? dcbnl_ieee_del+0x150/0x150<br /> [ 95.972341] dcb_doit+0x124/0x1b0<br /> [ 95.972392] rtnetlink_rcv_msg+0x243/0x2f0<br /> [ 95.972457] ? dcb_doit+0x14d/0x1b0<br /> [ 95.972510] ? __kmalloc_node_track_caller+0x1d3/0x280<br /> [ 95.972591] ? rtnl_calcit.isra.31+0x100/0x100<br /> [ 95.972661] netlink_rcv_skb+0xcf/0xf0<br /> [ 95.972720] netlink_unicast+0x16d/0x220<br /> [ 95.972781] netlink_sendmsg+0x2ba/0x3a0<br /> [ 95.975891] sock_sendmsg+0x4c/0x50<br /> [ 95.979032] ___sys_sendmsg+0x2e4/0x300<br /> [ 95.982147] ? kmem_cache_alloc+0x13e/0x190<br /> [ 95.985242] ? __wake_up_common_lock+0x79/0x90<br /> [ 95.988338] ? __check_object_size+0xac/0x1b0<br /> [ 95.991440] ? _copy_to_user+0x22/0x30<br /> [ 95.994539] ? move_addr_to_user+0xbb/0xd0<br /> [ 95.997619] ? __sys_sendmsg+0x53/0x80<br /> [ 96.000664] __sys_sendmsg+0x53/0x80<br /> [ 96.003747] do_syscall_64+0x5b/0x1d0<br /> [ 96.006862] entry_SYSCALL_64_after_hwframe+0x65/0xca<br /> <br /> Only update num_txq/rxq when passed check, and restore tc_cfg if setup<br /> queue map failed.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18.8 (including) 5.19 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.19.1 (including) 5.19.12 (excluding)
cpe:2.3:o:linux:linux_kernel:5.19:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*