CVE-2022-49194
Linux Kernel vulnerability analysis and mitigation

Overview

In the Linux kernel, a vulnerability (CVE-2022-49194) was discovered in the bcmgenet network driver. The issue arose when GCC12's improved dependency tracking identified that relaxed variants of register read/write operations were being treated as normal loads and stores, leading to potential ordering issues. This vulnerability particularly affected the Raspberry Pi 4 Model B and similar systems using the bcmgenet driver (Kernel Git).

Technical details

The vulnerability stems from the assumption that device memory would be mapped non-reordering, and that other constructs (spinlocks/etc) would provide the barriers to ensure proper ordering of packet data and memory rings/queues with respect to device register reads/writes. However, GCC12's optimization capabilities allowed it to reorder the actual reads/writes as if they were independent operations, when in reality they were not. This resulted in the compiler being unable to maintain the required ordering constraints (Kernel Git).

Impact

The vulnerability manifested as transmit queue timeouts and unreliable data transmission. When triggered, it would cause the network device watchdog to report timeouts, specifically showing messages like 'NETDEV WATCHDOG: enabcm6e4ei0 (bcmgenet): transmit queue 1 timed out'. This affected the network stability and performance of affected systems (Kernel Git).

Mitigation and workarounds

The vulnerability was resolved by replacing the relaxed register access variants (readlrelaxed/writelrelaxed) with stronger variants (readl/writel) that ensure proper ordering. While this partially reverted an older optimization, it was deemed necessary for system stability. For performance-critical code paths, selective relaxation of these constraints could be implemented after ensuring proper barriers (Kernel Git).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40343MEDIUM6.4
  • Linux KernelLinux Kernel
  • linux-gcp-5.15
NoYesDec 09, 2025
CVE-2025-40342MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-64k-debug-core
NoYesDec 09, 2025
CVE-2025-40340MEDIUM6.4
  • Linux KernelLinux Kernel
  • kernel-rt-debug-kvm
NoYesDec 09, 2025
CVE-2025-40341MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-64k
NoYesDec 09, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-fde-6.14
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management