
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49725 affects the Linux kernel's i40e network driver. The vulnerability was discovered when a call trace occurred in setuptxdescriptors after PF reset and ethtool -t operations, sometimes leading to system panic. The issue manifests when there is insufficient time (less than 5 seconds) between reset and test operations (Kernel Commit).
The vulnerability occurs due to a race condition between two i40evsiclose calls - one from prepforreset during PF reset and another from diagtest during ethtool -t operation. If the second i40evsiclose starts before the previous one completes, it leads to a crash. The issue was fixed by adding a check in diagtest to verify if PF is in reset state and preventing offline tests from starting in such cases (Kernel Commit).
When exploited, this vulnerability can cause system instability through kernel panics and crashes, potentially leading to denial of service conditions on affected systems running the i40e network driver (Kernel Commit).
The fix involves adding checks in the diag_test function to prevent offline testing when PF is in reset state. The patch also improves error handling by adding appropriate warning messages and failure notifications. Users should update to patched kernel versions that include the fix (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."