Skip to main content

CVE-2022-49662: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49662cvecve-2022-49662
Published: Wed Feb 26 2025 (02/26/2025, 02:23:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix lockdep splat in in6_dump_addrs() As reported by syzbot, we should not use rcu_dereference() when rcu_read_lock() is not held. WARNING: suspicious RCU usage 5.19.0-rc2-syzkaller #0 Not tainted net/ipv6/addrconf.c:5175 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor326/3617: #0: ffffffff8d5848e8 (rtnl_mutex){+.+.}-{3:3}, at: netlink_dump+0xae/0xc20 net/netlink/af_netlink.c:2223 stack backtrace: CPU: 0 PID: 3617 Comm: syz-executor326 Not tainted 5.19.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 in6_dump_addrs+0x12d1/0x1790 net/ipv6/addrconf.c:5175 inet6_dump_addr+0x9c1/0xb50 net/ipv6/addrconf.c:5300 netlink_dump+0x541/0xc20 net/netlink/af_netlink.c:2275 __netlink_dump_start+0x647/0x900 net/netlink/af_netlink.c:2380 netlink_dump_start include/linux/netlink.h:245 [inline] rtnetlink_rcv_msg+0x73e/0xc90 net/core/rtnetlink.c:6046 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2501 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline] netlink_unicast+0x543/0x7f0 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x917/0xe10 net/netlink/af_netlink.c:1921 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg+0xcf/0x120 net/socket.c:734 ____sys_sendmsg+0x6eb/0x810 net/socket.c:2492 ___sys_sendmsg+0xf3/0x170 net/socket.c:2546 __sys_sendmsg net/socket.c:2575 [inline] __do_sys_sendmsg net/socket.c:2584 [inline] __se_sys_sendmsg net/socket.c:2582 [inline] __x64_sys_sendmsg+0x132/0x220 net/socket.c:2582 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0

AI-Powered Analysis

AILast updated: 06/29/2025, 23:56:13 UTC

Technical Analysis

CVE-2022-49662 is a vulnerability identified in the Linux kernel, specifically within the IPv6 networking stack. The issue arises from improper usage of Read-Copy-Update (RCU) synchronization primitives in the function in6_dump_addrs(), which is responsible for dumping IPv6 addresses. The vulnerability was reported by syzbot, an automated kernel fuzzer, which detected suspicious RCU usage where rcu_dereference() is called without holding the required rcu_read_lock(). This incorrect synchronization can lead to race conditions and potential kernel instability or crashes. The detailed technical description indicates that the problem occurs in the addrconf.c source file, with a suspicious rcu_dereference_check() usage at line 5175. The stack trace shows that the issue manifests during netlink socket operations, particularly when dumping network addresses via rtnetlink messages. The root cause is the violation of RCU usage rules, which can cause lock dependency errors (lockdep splat) and potentially lead to kernel panics or denial of service. Although no known exploits are currently reported in the wild, the vulnerability affects Linux kernel versions identified by specific commit hashes, implying it is present in recent or development kernel releases. No CVSS score has been assigned yet, and no patches or mitigations are linked in the provided data, but the issue is recognized and published as a security vulnerability.

Potential Impact

For European organizations, the impact of CVE-2022-49662 can be significant, especially for those relying on Linux-based infrastructure for critical networking and server operations. The vulnerability affects the IPv6 stack, which is increasingly important as IPv6 adoption grows across Europe. Exploitation could lead to kernel crashes or denial of service conditions, disrupting network services, cloud environments, and containerized applications running on vulnerable Linux kernels. This could impact availability of services, leading to operational downtime and potential financial losses. While there is no evidence of privilege escalation or remote code execution directly from this vulnerability, the instability caused by improper RCU usage can be leveraged in complex attack chains or targeted denial of service attacks. Organizations with large-scale deployments of Linux servers, especially those using custom or development kernel versions, are at higher risk. The lack of known exploits suggests that the threat is currently low but could increase once exploit techniques mature or if attackers discover ways to trigger the flaw remotely via network interactions.

Mitigation Recommendations

To mitigate CVE-2022-49662, European organizations should prioritize updating their Linux kernels to versions where this vulnerability is fixed. Since the vulnerability is related to kernel code, applying vendor-supplied kernel patches or upgrading to stable kernel releases that include the fix is the most effective measure. Organizations should monitor Linux kernel mailing lists and official repositories for patch announcements related to this issue. Additionally, auditing and restricting access to systems running vulnerable kernels can reduce exposure. Network segmentation and limiting access to netlink interfaces can help mitigate exploitation risks. For environments using custom or development kernels, thorough testing and code review of networking components, especially those involving RCU usage, are recommended. Employing kernel hardening techniques and runtime protections such as Kernel Address Sanitizer (KASAN) or lockdep can help detect similar issues proactively. Finally, organizations should maintain robust monitoring to detect unusual kernel crashes or network disruptions that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.435Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4791

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/29/2025, 11:56:13 PM

Last updated: 8/11/2025, 12:15:11 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats