CVE-2022-49066: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: veth: Ensure eth header is in skb's linear part After feeding a decapsulated packet to a veth device with act_mirred, skb_headlen() may be 0. But veth_xmit() calls __dev_forward_skb(), which expects at least ETH_HLEN byte of linear data (as __dev_forward_skb2() calls eth_type_trans(), which pulls ETH_HLEN bytes unconditionally). Use pskb_may_pull() to ensure veth_xmit() respects this constraint. kernel BUG at include/linux/skbuff.h:2328! RIP: 0010:eth_type_trans+0xcf/0x140 Call Trace: <IRQ> __dev_forward_skb2+0xe3/0x160 veth_xmit+0x6e/0x250 [veth] dev_hard_start_xmit+0xc7/0x200 __dev_queue_xmit+0x47f/0x520 ? skb_ensure_writable+0x85/0xa0 ? skb_mpls_pop+0x98/0x1c0 tcf_mirred_act+0x442/0x47e [act_mirred] tcf_action_exec+0x86/0x140 fl_classify+0x1d8/0x1e0 [cls_flower] ? dma_pte_clear_level+0x129/0x1a0 ? dma_pte_clear_level+0x129/0x1a0 ? prb_fill_curr_block+0x2f/0xc0 ? skb_copy_bits+0x11a/0x220 __tcf_classify+0x58/0x110 tcf_classify_ingress+0x6b/0x140 __netif_receive_skb_core.constprop.0+0x47d/0xfd0 ? __iommu_dma_unmap_swiotlb+0x44/0x90 __netif_receive_skb_one_core+0x3d/0xa0 netif_receive_skb+0x116/0x170 be_process_rx+0x22f/0x330 [be2net] be_poll+0x13c/0x370 [be2net] __napi_poll+0x2a/0x170 net_rx_action+0x22f/0x2f0 __do_softirq+0xca/0x2a8 __irq_exit_rcu+0xc1/0xe0 common_interrupt+0x83/0xa0
AI Analysis
Technical Summary
CVE-2022-49066 is a vulnerability in the Linux kernel's virtual Ethernet (veth) device driver, specifically related to packet handling when using the act_mirred action for mirroring or redirecting network traffic. The issue arises because after a decapsulated packet is fed to a veth device with act_mirred, the skb_headlen() function may return 0, indicating that the linear part of the socket buffer (skb) does not contain the expected Ethernet header length (ETH_HLEN). However, the veth_xmit() function calls __dev_forward_skb(), which in turn calls eth_type_trans() expecting at least ETH_HLEN bytes of linear data unconditionally. This mismatch can cause a kernel BUG due to dereferencing invalid memory or accessing uninitialized data. The root cause is that veth_xmit() does not ensure that the skb's linear part contains the Ethernet header before forwarding the packet. The fix involves using pskb_may_pull() to guarantee that the skb's linear area includes the required ETH_HLEN bytes, preventing the kernel panic. The vulnerability can lead to a denial of service (DoS) by crashing the kernel when processing specially crafted network packets through veth devices with mirroring enabled. The vulnerability affects Linux kernel versions identified by the given commit hashes and was published on 2025-02-26. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with veth devices configured, especially in environments using network namespaces, containerization (e.g., Docker, Kubernetes), or advanced network traffic mirroring and redirection setups. Since veth devices are commonly used in container networking, cloud infrastructure, and virtualized environments, exploitation could cause kernel crashes leading to denial of service. This can disrupt critical services, impact availability of cloud-hosted applications, and cause downtime in data centers or enterprise networks. The vulnerability does not appear to allow privilege escalation or remote code execution directly but can be leveraged to cause instability or service interruptions. Organizations relying on Linux-based network infrastructure, virtualized environments, or container orchestration platforms are particularly at risk. The impact is heightened in environments where high availability is critical, such as financial institutions, telecommunications, and public sector services across Europe.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2022-49066 as soon as they become available from trusted sources or Linux distribution vendors. 2. For environments using container orchestration platforms, ensure that the underlying host kernels are updated promptly. 3. Temporarily disable or restrict the use of act_mirred actions on veth devices if patching is not immediately possible, to reduce exposure. 4. Implement network segmentation and strict access controls to limit the ability of untrusted users or processes to inject or manipulate network traffic that could trigger this vulnerability. 5. Monitor kernel logs and system stability for signs of kernel panics or crashes related to network packet processing. 6. Employ runtime security tools that can detect abnormal kernel behavior or network traffic anomalies. 7. Coordinate with Linux distribution maintainers and cloud providers to track patch availability and deployment status.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49066: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: veth: Ensure eth header is in skb's linear part After feeding a decapsulated packet to a veth device with act_mirred, skb_headlen() may be 0. But veth_xmit() calls __dev_forward_skb(), which expects at least ETH_HLEN byte of linear data (as __dev_forward_skb2() calls eth_type_trans(), which pulls ETH_HLEN bytes unconditionally). Use pskb_may_pull() to ensure veth_xmit() respects this constraint. kernel BUG at include/linux/skbuff.h:2328! RIP: 0010:eth_type_trans+0xcf/0x140 Call Trace: <IRQ> __dev_forward_skb2+0xe3/0x160 veth_xmit+0x6e/0x250 [veth] dev_hard_start_xmit+0xc7/0x200 __dev_queue_xmit+0x47f/0x520 ? skb_ensure_writable+0x85/0xa0 ? skb_mpls_pop+0x98/0x1c0 tcf_mirred_act+0x442/0x47e [act_mirred] tcf_action_exec+0x86/0x140 fl_classify+0x1d8/0x1e0 [cls_flower] ? dma_pte_clear_level+0x129/0x1a0 ? dma_pte_clear_level+0x129/0x1a0 ? prb_fill_curr_block+0x2f/0xc0 ? skb_copy_bits+0x11a/0x220 __tcf_classify+0x58/0x110 tcf_classify_ingress+0x6b/0x140 __netif_receive_skb_core.constprop.0+0x47d/0xfd0 ? __iommu_dma_unmap_swiotlb+0x44/0x90 __netif_receive_skb_one_core+0x3d/0xa0 netif_receive_skb+0x116/0x170 be_process_rx+0x22f/0x330 [be2net] be_poll+0x13c/0x370 [be2net] __napi_poll+0x2a/0x170 net_rx_action+0x22f/0x2f0 __do_softirq+0xca/0x2a8 __irq_exit_rcu+0xc1/0xe0 common_interrupt+0x83/0xa0
AI-Powered Analysis
Technical Analysis
CVE-2022-49066 is a vulnerability in the Linux kernel's virtual Ethernet (veth) device driver, specifically related to packet handling when using the act_mirred action for mirroring or redirecting network traffic. The issue arises because after a decapsulated packet is fed to a veth device with act_mirred, the skb_headlen() function may return 0, indicating that the linear part of the socket buffer (skb) does not contain the expected Ethernet header length (ETH_HLEN). However, the veth_xmit() function calls __dev_forward_skb(), which in turn calls eth_type_trans() expecting at least ETH_HLEN bytes of linear data unconditionally. This mismatch can cause a kernel BUG due to dereferencing invalid memory or accessing uninitialized data. The root cause is that veth_xmit() does not ensure that the skb's linear part contains the Ethernet header before forwarding the packet. The fix involves using pskb_may_pull() to guarantee that the skb's linear area includes the required ETH_HLEN bytes, preventing the kernel panic. The vulnerability can lead to a denial of service (DoS) by crashing the kernel when processing specially crafted network packets through veth devices with mirroring enabled. The vulnerability affects Linux kernel versions identified by the given commit hashes and was published on 2025-02-26. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with veth devices configured, especially in environments using network namespaces, containerization (e.g., Docker, Kubernetes), or advanced network traffic mirroring and redirection setups. Since veth devices are commonly used in container networking, cloud infrastructure, and virtualized environments, exploitation could cause kernel crashes leading to denial of service. This can disrupt critical services, impact availability of cloud-hosted applications, and cause downtime in data centers or enterprise networks. The vulnerability does not appear to allow privilege escalation or remote code execution directly but can be leveraged to cause instability or service interruptions. Organizations relying on Linux-based network infrastructure, virtualized environments, or container orchestration platforms are particularly at risk. The impact is heightened in environments where high availability is critical, such as financial institutions, telecommunications, and public sector services across Europe.
Mitigation Recommendations
1. Apply the official Linux kernel patches that address CVE-2022-49066 as soon as they become available from trusted sources or Linux distribution vendors. 2. For environments using container orchestration platforms, ensure that the underlying host kernels are updated promptly. 3. Temporarily disable or restrict the use of act_mirred actions on veth devices if patching is not immediately possible, to reduce exposure. 4. Implement network segmentation and strict access controls to limit the ability of untrusted users or processes to inject or manipulate network traffic that could trigger this vulnerability. 5. Monitor kernel logs and system stability for signs of kernel panics or crashes related to network packet processing. 6. Employ runtime security tools that can detect abnormal kernel behavior or network traffic anomalies. 7. Coordinate with Linux distribution maintainers and cloud providers to track patch availability and deployment status.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.244Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6a47
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 1:54:53 AM
Last updated: 7/26/2025, 4:55:17 AM
Views: 6
Related Threats
CVE-2025-46660: n/a
UnknownCVE-2025-46659: n/a
HighCVE-2025-38747: CWE-378: Creation of Temporary File With Insecure Permissions in Dell SupportAssist OS Recovery
HighCVE-2025-38746: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Dell SupportAssist OS Recovery
LowCVE-2025-51624: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.