目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2022-49605— Linux kernel 安全漏洞

EPSS 0.15% · P35
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2022-49605 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
igc: Reinstate IGC_REMOVED logic and implement it properly
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: igc: Reinstate IGC_REMOVED logic and implement it properly The initially merged version of the igc driver code (via commit 146740f9abc4, "igc: Add support for PF") contained the following IGC_REMOVED checks in the igc_rd32/wr32() MMIO accessors: u32 igc_rd32(struct igc_hw *hw, u32 reg) { u8 __iomem *hw_addr = READ_ONCE(hw->hw_addr); u32 value = 0; if (IGC_REMOVED(hw_addr)) return ~value; value = readl(&hw_addr[reg]); /* reads should not return all F's */ if (!(~value) && (!reg || !(~readl(hw_addr)))) hw->hw_addr = NULL; return value; } And: #define wr32(reg, val) \ do { \ u8 __iomem *hw_addr = READ_ONCE((hw)->hw_addr); \ if (!IGC_REMOVED(hw_addr)) \ writel((val), &hw_addr[(reg)]); \ } while (0) E.g. igb has similar checks in its MMIO accessors, and has a similar macro E1000_REMOVED, which is implemented as follows: #define E1000_REMOVED(h) unlikely(!(h)) These checks serve to detect and take note of an 0xffffffff MMIO read return from the device, which can be caused by a PCIe link flap or some other kind of PCI bus error, and to avoid performing MMIO reads and writes from that point onwards. However, the IGC_REMOVED macro was not originally implemented: #ifndef IGC_REMOVED #define IGC_REMOVED(a) (0) #endif /* IGC_REMOVED */ This led to the IGC_REMOVED logic to be removed entirely in a subsequent commit (commit 3c215fb18e70, "igc: remove IGC_REMOVED function"), with the rationale that such checks matter only for virtualization and that igc does not support virtualization -- but a PCIe device can become detached even without virtualization being in use, and without proper checks, a PCIe bus error affecting an igc adapter will lead to various NULL pointer dereferences, as the first access after the error will set hw->hw_addr to NULL, and subsequent accesses will blindly dereference this now-NULL pointer. This patch reinstates the IGC_REMOVED checks in igc_rd32/wr32(), and implements IGC_REMOVED the way it is done for igb, by checking for the unlikely() case of hw_addr being NULL. This change prevents the oopses seen when a PCIe link flap occurs on an igc adapter.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于igc驱动中的IGC_REMOVED逻辑未正确实现。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 146740f9abc4976e4f0af1aa302efee1c699d2e4 ~ 16cb6717f4f42487ef10583eb8bc98e7d1e33d65 -
LinuxLinux 4.20 -

二、漏洞 CVE-2022-49605 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2022-49605 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2025-02-26 · 共 706 条

CVE-2022-49496Linux kernel 安全漏洞
CVE-2022-49487Linux kernel 安全漏洞
CVE-2022-49486Linux kernel 安全漏洞
CVE-2022-49488Linux kernel 安全漏洞
CVE-2022-49489Linux kernel 安全漏洞
CVE-2022-49490Linux kernel 安全漏洞
CVE-2022-49491Linux kernel 安全漏洞
CVE-2022-49492Linux kernel 安全漏洞
CVE-2022-49493Linux kernel 安全漏洞
CVE-2022-49494Linux kernel 安全漏洞
CVE-2022-49495Linux kernel 安全漏洞
CVE-2022-49497Linux kernel 安全漏洞
CVE-2022-49503Linux kernel 安全漏洞
CVE-2022-49508Linux kernel 安全漏洞
CVE-2022-49506Linux kernel 安全漏洞
CVE-2022-49504Linux kernel 安全漏洞
CVE-2022-49505Linux kernel 安全漏洞
CVE-2022-49502Linux kernel 安全漏洞
CVE-2022-49499Linux kernel 安全漏洞
CVE-2022-49498Linux kernel 安全漏洞

显示前 20 条,共 706 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-49605

暂无评论


发表评论