Skip to main content

CVE-2022-49205: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49205cvecve-2022-49205
Published: Wed Feb 26 2025 (02/26/2025, 01:55:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix double uncharge the mem of sk_msg If tcp_bpf_sendmsg is running during a tear down operation, psock may be freed. tcp_bpf_sendmsg() tcp_bpf_send_verdict() sk_msg_return() tcp_bpf_sendmsg_redir() unlikely(!psock)) sk_msg_free() The mem of msg has been uncharged in tcp_bpf_send_verdict() by sk_msg_return(), and would be uncharged by sk_msg_free() again. When psock is null, we can simply returning an error code, this would then trigger the sk_msg_free_nocharge in the error path of __SK_REDIRECT and would have the side effect of throwing an error up to user space. This would be a slight change in behavior from user side but would look the same as an error if the redirect on the socket threw an error. This issue can cause the following info: WARNING: CPU: 0 PID: 2136 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x13c/0x260 Call Trace: <TASK> __sk_destruct+0x24/0x1f0 sk_psock_destroy+0x19b/0x1c0 process_one_work+0x1b3/0x3c0 worker_thread+0x30/0x350 ? process_one_work+0x3c0/0x3c0 kthread+0xe6/0x110 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 </TASK>

AI-Powered Analysis

AILast updated: 06/30/2025, 04:12:01 UTC

Technical Analysis

CVE-2022-49205 is a vulnerability identified in the Linux kernel's implementation of the Berkeley Packet Filter (BPF) sockmap functionality, specifically related to the handling of memory accounting during TCP socket message operations. The flaw arises from a double uncharge (double free-like) condition of the memory associated with sk_msg structures when the tcp_bpf_sendmsg function is executed concurrently with socket teardown operations. The root cause is that memory is uncharged once in tcp_bpf_send_verdict() via sk_msg_return(), and then again in sk_msg_free(), leading to potential use-after-free or memory corruption scenarios. When the psock pointer is null, the code path returns an error, which triggers sk_msg_free_nocharge in the error handling path of __SK_REDIRECT. This behavior can cause kernel warnings or errors, such as "WARNING: CPU: 0 PID: 2136 at net/ipv4/af_inet.c:155 inet_sock_destruct" and associated call traces, indicating instability or crashes in the kernel network stack. Although the vulnerability does not appear to have known exploits in the wild, the underlying issue could lead to denial of service (DoS) conditions due to kernel panics or crashes, and potentially memory corruption that might be leveraged for privilege escalation or arbitrary code execution in a worst-case scenario. The vulnerability affects Linux kernel versions identified by the given commit hashes, which correspond to specific kernel releases prior to the patch. The issue is subtle and involves intricate kernel memory management and BPF socket redirection internals, making it a complex threat to detect and exploit but significant due to the critical role of the Linux kernel in system stability and security.

Potential Impact

For European organizations, the impact of CVE-2022-49205 can be substantial, especially for those relying heavily on Linux-based infrastructure, including servers, cloud environments, and network appliances. The vulnerability can cause kernel crashes or instability in network-related operations, leading to denial of service conditions that disrupt business-critical applications and services. In environments where BPF sockmap features are used for advanced networking, monitoring, or security functions, exploitation or accidental triggering of this flaw could degrade system reliability. Although no known exploits exist currently, the potential for memory corruption raises concerns about privilege escalation or arbitrary code execution, which could compromise confidentiality and integrity of sensitive data. Given the widespread use of Linux in European data centers, telecommunications, and government systems, this vulnerability poses a risk to operational continuity and data security. Organizations in sectors such as finance, healthcare, and critical infrastructure, which depend on high availability and secure networking, may face increased risk if patches are not applied promptly.

Mitigation Recommendations

To mitigate CVE-2022-49205, European organizations should: 1) Apply the official Linux kernel patches that address the double uncharge issue in the BPF sockmap code as soon as they become available from trusted Linux distributions or kernel maintainers. 2) Monitor kernel updates and subscribe to security advisories from Linux vendors and the CVE database to stay informed about fixes and related vulnerabilities. 3) Conduct thorough testing of kernel updates in staging environments to ensure compatibility and stability before deployment in production. 4) Limit the use of BPF sockmap and related advanced networking features to trusted applications and users, reducing the attack surface. 5) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR), Control Flow Integrity (CFI), and seccomp filters to mitigate exploitation risks. 6) Implement robust monitoring and alerting for kernel warnings, crashes, or unusual network socket behaviors that might indicate attempts to trigger this vulnerability. 7) Maintain comprehensive backups and incident response plans to quickly recover from potential denial of service or compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.291Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5262

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 4:12:01 AM

Last updated: 7/30/2025, 1:41:01 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats