CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
iavf: Fix hang during reboot/shutdown
Recent commit 974578017fc1 (“iavf: Add waiting so the port is
initialized in remove”) adds a wait-loop at the beginning of
iavf_remove() to ensure that port initialization is finished
prior unregistering net device. This causes a regression
in reboot/shutdown scenario because in this case callback
iavf_shutdown() is called and this callback detaches the device,
makes it down if it is running and sets its state to __IAVF_REMOVE.
Later shutdown callback of associated PF driver (e.g. ice_shutdown)
is called. That callback calls among other things sriov_disable()
that calls indirectly iavf_remove() (see stack trace below).
As the adapter state is already __IAVF_REMOVE then the mentioned
loop is end-less and shutdown process hangs.
The patch fixes this by checking adapter’s state at the beginning
of iavf_remove() and skips the rest of the function if the adapter
is already in remove state (shutdown is in progress).
Reproducer:
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gke | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-hwe-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-intel-iotg | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-kvm | < any | UNKNOWN |
git.kernel.org/linus/b04683ff8f0823b869c219c78ba0d974bddea0b5 (5.17)
git.kernel.org/stable/c/4477b9a4193b35eb3a8afd2adf2d42add2f88d57
git.kernel.org/stable/c/80974bb730270199c6fcb189af04d5945b87e813
git.kernel.org/stable/c/b04683ff8f0823b869c219c78ba0d974bddea0b5
launchpad.net/bugs/cve/CVE-2022-48840
nvd.nist.gov/vuln/detail/CVE-2022-48840
security-tracker.debian.org/tracker/CVE-2022-48840
www.cve.org/CVERecord?id=CVE-2022-48840