Skip to main content

CVE-2022-48999: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-48999cvecve-2022-48999
Published: Mon Oct 21 2024 (10/21/2024, 20:06:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference Gwangun Jung reported a slab-out-of-bounds access in fib_nh_match: fib_nh_match+0xf98/0x1130 linux-6.0-rc7/net/ipv4/fib_semantics.c:961 fib_table_delete+0x5f3/0xa40 linux-6.0-rc7/net/ipv4/fib_trie.c:1753 inet_rtm_delroute+0x2b3/0x380 linux-6.0-rc7/net/ipv4/fib_frontend.c:874 Separate nexthop objects are mutually exclusive with the legacy multipath spec. Fix fib_nh_match to return if the config for the to be deleted route contains a multipath spec while the fib_info is using a nexthop object.

AI-Powered Analysis

AILast updated: 07/01/2025, 00:57:39 UTC

Technical Analysis

CVE-2022-48999 is a vulnerability identified in the Linux kernel's IPv4 routing subsystem, specifically related to the handling of multipath routes and next-hop (nexthop) objects. The flaw arises from a slab-out-of-bounds access in the function fib_nh_match, which is part of the kernel code responsible for matching next-hop entries during route deletion operations. The vulnerability occurs when an attempt is made to delete a multipath route while the fib_info structure contains a reference to a nexthop object. Multipath routing in Linux allows multiple paths for the same destination, improving redundancy and load balancing. However, the kernel's legacy multipath specification and the newer nexthop object approach are mutually exclusive. The bug is due to fib_nh_match not properly handling the case where a route to be deleted has a multipath specification but fib_info uses a nexthop object, leading to an out-of-bounds memory access. This can cause kernel memory corruption, potentially leading to system crashes (denial of service) or, in some cases, could be leveraged for privilege escalation or arbitrary code execution if exploited carefully. The vulnerability was reported by Gwangun Jung and fixed in Linux kernel version 6.0-rc7. No known exploits are currently reported in the wild. The affected versions are identified by specific commit hashes, indicating that this is a recent and targeted fix in the kernel's routing codebase.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running vulnerable Linux kernel versions, especially those that utilize advanced IPv4 routing features such as multipath routing or nexthop objects. Network infrastructure devices, servers, and cloud instances running Linux kernels prior to the fix could experience kernel crashes leading to denial of service, disrupting critical services and network availability. In environments where attackers have local access or can send crafted routing messages, there is a potential risk of privilege escalation or arbitrary code execution, which could compromise confidentiality and integrity of systems. Given the widespread use of Linux in European data centers, telecom infrastructure, and enterprise servers, the impact could be significant if exploited. However, the lack of known exploits and the requirement for specific routing configurations and conditions reduce the immediate threat level. Still, organizations relying on Linux-based routing or network-heavy workloads should prioritize patching to avoid service disruptions and potential security breaches.

Mitigation Recommendations

1. Apply the official Linux kernel patch that addresses CVE-2022-48999 as soon as possible. This fix is included starting from Linux kernel version 6.0-rc7 and subsequent stable releases. 2. For systems where immediate patching is not feasible, consider disabling or avoiding the use of multipath routing and nexthop objects in IPv4 routing configurations to reduce exposure. 3. Monitor kernel logs and system behavior for signs of crashes or unusual routing table modifications that could indicate attempted exploitation. 4. Restrict local and network access to trusted users and systems to minimize the risk of crafted routing messages triggering the vulnerability. 5. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and SELinux/AppArmor policies to limit the impact of potential exploitation. 6. Maintain up-to-date inventory of Linux kernel versions in use across the organization to identify vulnerable systems quickly. 7. Engage with Linux distribution vendors for backported patches if using long-term support kernels that do not yet include the fix.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-22T01:27:53.642Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6874

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/1/2025, 12:57:39 AM

Last updated: 8/11/2025, 7:54:33 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats