Skip to main content

CVE-2022-49066: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49066cvecve-2022-49066
Published: Wed Feb 26 2025 (02/26/2025, 01:54:34 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: veth: Ensure eth header is in skb's linear part After feeding a decapsulated packet to a veth device with act_mirred, skb_headlen() may be 0. But veth_xmit() calls __dev_forward_skb(), which expects at least ETH_HLEN byte of linear data (as __dev_forward_skb2() calls eth_type_trans(), which pulls ETH_HLEN bytes unconditionally). Use pskb_may_pull() to ensure veth_xmit() respects this constraint. kernel BUG at include/linux/skbuff.h:2328! RIP: 0010:eth_type_trans+0xcf/0x140 Call Trace: <IRQ> __dev_forward_skb2+0xe3/0x160 veth_xmit+0x6e/0x250 [veth] dev_hard_start_xmit+0xc7/0x200 __dev_queue_xmit+0x47f/0x520 ? skb_ensure_writable+0x85/0xa0 ? skb_mpls_pop+0x98/0x1c0 tcf_mirred_act+0x442/0x47e [act_mirred] tcf_action_exec+0x86/0x140 fl_classify+0x1d8/0x1e0 [cls_flower] ? dma_pte_clear_level+0x129/0x1a0 ? dma_pte_clear_level+0x129/0x1a0 ? prb_fill_curr_block+0x2f/0xc0 ? skb_copy_bits+0x11a/0x220 __tcf_classify+0x58/0x110 tcf_classify_ingress+0x6b/0x140 __netif_receive_skb_core.constprop.0+0x47d/0xfd0 ? __iommu_dma_unmap_swiotlb+0x44/0x90 __netif_receive_skb_one_core+0x3d/0xa0 netif_receive_skb+0x116/0x170 be_process_rx+0x22f/0x330 [be2net] be_poll+0x13c/0x370 [be2net] __napi_poll+0x2a/0x170 net_rx_action+0x22f/0x2f0 __do_softirq+0xca/0x2a8 __irq_exit_rcu+0xc1/0xe0 common_interrupt+0x83/0xa0

AI-Powered Analysis

AILast updated: 07/01/2025, 01:54:53 UTC

Technical Analysis

CVE-2022-49066 is a vulnerability in the Linux kernel's virtual Ethernet (veth) device driver, specifically related to packet handling when using the act_mirred action for mirroring or redirecting network traffic. The issue arises because after a decapsulated packet is fed to a veth device with act_mirred, the skb_headlen() function may return 0, indicating that the linear part of the socket buffer (skb) does not contain the expected Ethernet header length (ETH_HLEN). However, the veth_xmit() function calls __dev_forward_skb(), which in turn calls eth_type_trans() expecting at least ETH_HLEN bytes of linear data unconditionally. This mismatch can cause a kernel BUG due to dereferencing invalid memory or accessing uninitialized data. The root cause is that veth_xmit() does not ensure that the skb's linear part contains the Ethernet header before forwarding the packet. The fix involves using pskb_may_pull() to guarantee that the skb's linear area includes the required ETH_HLEN bytes, preventing the kernel panic. The vulnerability can lead to a denial of service (DoS) by crashing the kernel when processing specially crafted network packets through veth devices with mirroring enabled. The vulnerability affects Linux kernel versions identified by the given commit hashes and was published on 2025-02-26. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with veth devices configured, especially in environments using network namespaces, containerization (e.g., Docker, Kubernetes), or advanced network traffic mirroring and redirection setups. Since veth devices are commonly used in container networking, cloud infrastructure, and virtualized environments, exploitation could cause kernel crashes leading to denial of service. This can disrupt critical services, impact availability of cloud-hosted applications, and cause downtime in data centers or enterprise networks. The vulnerability does not appear to allow privilege escalation or remote code execution directly but can be leveraged to cause instability or service interruptions. Organizations relying on Linux-based network infrastructure, virtualized environments, or container orchestration platforms are particularly at risk. The impact is heightened in environments where high availability is critical, such as financial institutions, telecommunications, and public sector services across Europe.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2022-49066 as soon as they become available from trusted sources or Linux distribution vendors. 2. For environments using container orchestration platforms, ensure that the underlying host kernels are updated promptly. 3. Temporarily disable or restrict the use of act_mirred actions on veth devices if patching is not immediately possible, to reduce exposure. 4. Implement network segmentation and strict access controls to limit the ability of untrusted users or processes to inject or manipulate network traffic that could trigger this vulnerability. 5. Monitor kernel logs and system stability for signs of kernel panics or crashes related to network packet processing. 6. Employ runtime security tools that can detect abnormal kernel behavior or network traffic anomalies. 7. Coordinate with Linux distribution maintainers and cloud providers to track patch availability and deployment status.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.244Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6a47

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/1/2025, 1:54:53 AM

Last updated: 7/26/2025, 4:55:17 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats