
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49452 affects the Linux kernel's dpaa2-eth driver. The vulnerability was discovered in the TSO (TCP Segmentation Offload) header handling where a virtual address was being accessed after its DMA mapping was removed, leading to an invalid virtual address being used in the kfree call (Kernel Git, Debian Tracker).
The vulnerability occurs in the dpaa2-eth driver when handling TSO headers. The issue arises because the DMA unmapping operation was performed before retrieving the virtual address that was later used to free the buffer. This sequence meant that the code was attempting to search for a DMA mapping that had already been removed to retrieve the virtual address, resulting in an invalid virtual address being passed to the kfree function (Kernel Git).
When triggered, this vulnerability causes a kernel paging request failure at a virtual address, potentially leading to system crashes. This is evidenced by the reported error message 'Unable to handle kernel paging request at virtual address' followed by a kernel stack trace (Kernel Git).
The issue has been fixed by modifying the code to call dpaa2_iova_to_virt() before the dma_unmap call, ensuring the virtual address is retrieved while the DMA mapping is still valid. The fix was implemented in the Linux kernel and is available through kernel updates (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."