vulnerability
Ubuntu: (CVE-2022-49709): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Feb 26, 2025 | Mar 19, 2025 | Oct 24, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
cfi: Fix __cfi_slowpath_diag RCU usage with cpuidle
RCU_NONIDLE usage during __cfi_slowpath_diag can result in an invalid
RCU state in the cpuidle code path:
WARNING: CPU: 1 PID: 0 at kernel/rcu/tree.c:613 rcu_eqs_enter+0xe4/0x138
...
Call trace:
rcu_eqs_enter+0xe4/0x138
rcu_idle_enter+0xa8/0x100
cpuidle_enter_state+0x154/0x3a8
cpuidle_enter+0x3c/0x58
do_idle.llvm.6590768638138871020+0x1f4/0x2ec
cpu_startup_entry+0x28/0x2c
secondary_start_kernel+0x1b8/0x220
__secondary_switched+0x94/0x98
Instead, call rcu_irq_enter/exit to wake up RCU only when needed and
disable interrupts for the entire CFI shadow/module check when we do.
Solutions
References
- CVE-2022-49709
- https://attackerkb.com/topics/CVE-2022-49709
- URL-https://git.kernel.org/linus/57cd6d157eb479f0a8e820fd36b7240845c8a937
- URL-https://git.kernel.org/stable/c/57cd6d157eb479f0a8e820fd36b7240845c8a937
- URL-https://git.kernel.org/stable/c/75f3a5fa2ad049c85ab5d5ee1ed9cfaa7e62c5ed
- URL-https://git.kernel.org/stable/c/ca3897f2ac02ceae5e6fa794f83c36f9885b93da
- URL-https://www.cve.org/CVERecord?id=CVE-2022-49709
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.