Skip to main content

CVE-2022-0742: CWE-275 Permission Issues in Linux Kernel

Medium
Published: Fri Mar 18 2022 (03/18/2022, 11:20:11 UTC)
Source: CVE
Vendor/Project: Linux
Product: Kernel

Description

Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.

AI-Powered Analysis

AILast updated: 06/20/2025, 13:33:13 UTC

Technical Analysis

CVE-2022-0742 is a medium-severity vulnerability identified in the Linux Kernel, specifically affecting versions 5.13 and later. The issue arises from a memory leak in the implementation of ICMPv6 (Internet Control Message Protocol version 6), particularly when processing ICMPv6 packet types 130 (Router Advertisement) and 131 (Router Solicitation). These packet types are essential for IPv6 network operations, facilitating router discovery and network configuration. The vulnerability allows a remote attacker to send specially crafted ICMPv6 packets that cause the kernel to leak memory continuously, eventually exhausting system memory resources and leading to a denial-of-service (DoS) condition. The root cause is linked to improper permission handling (CWE-275), which results in the kernel failing to correctly manage memory allocation and deallocation for these packets. Exploitation does not require authentication or user interaction, as the attacker can send malicious ICMPv6 packets directly over the network. Although no known exploits have been reported in the wild, the vulnerability's nature makes it a viable vector for DoS attacks against Linux-based systems exposed to IPv6 traffic. The recommended mitigation is to upgrade the Linux kernel to a version that includes the patch introduced after commit 2d3916f3189172d5c69d33065c3c21119fe539fc, which addresses the memory leak issue by correcting the handling of ICMPv6 packets and associated permissions.

Potential Impact

For European organizations, the impact of CVE-2022-0742 can be significant, especially for those relying heavily on Linux-based infrastructure and IPv6 networking. The vulnerability enables remote attackers to cause system outages by exhausting memory resources, potentially disrupting critical services such as web hosting, cloud computing platforms, telecommunications infrastructure, and industrial control systems. Given the increasing adoption of IPv6 in Europe, particularly in sectors like finance, government, and telecommunications, the risk of service disruption is heightened. Organizations operating data centers or cloud services with Linux kernels vulnerable to this flaw may experience degraded availability, leading to operational downtime and potential financial losses. Additionally, the DoS condition could be leveraged as a diversion tactic in multi-stage attacks, complicating incident response efforts. While confidentiality and integrity are not directly impacted, the availability degradation can have cascading effects on business continuity and user trust.

Mitigation Recommendations

To mitigate CVE-2022-0742 effectively, European organizations should: 1) Prioritize upgrading Linux kernels to versions that include the fix post commit 2d3916f3189172d5c69d33065c3c21119fe539fc. This is the most direct and reliable mitigation. 2) Implement network-level filtering to restrict or monitor ICMPv6 traffic, particularly types 130 and 131, from untrusted sources or external networks. This can be achieved using firewall rules or intrusion prevention systems configured to detect anomalous ICMPv6 packet patterns. 3) Employ rate limiting on ICMPv6 packets to reduce the risk of memory exhaustion from high-volume attacks. 4) Conduct regular kernel and system audits to ensure all security patches are applied promptly. 5) For critical infrastructure, consider deploying network segmentation to isolate IPv6 traffic and limit exposure. 6) Monitor system memory usage and kernel logs for unusual activity indicative of attempted exploitation. These targeted steps go beyond generic patching advice and focus on reducing attack surface and early detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google
Date Reserved
2022-02-23T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf7f5b

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 1:33:13 PM

Last updated: 7/31/2025, 8:28:04 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats