Skip to main content

CVE-2022-49664: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49664cvecve-2022-49664
Published: Wed Feb 26 2025 (02/26/2025, 02:23:59 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: tipc: move bc link creation back to tipc_node_create Shuang Li reported a NULL pointer dereference crash: [] BUG: kernel NULL pointer dereference, address: 0000000000000068 [] RIP: 0010:tipc_link_is_up+0x5/0x10 [tipc] [] Call Trace: [] <IRQ> [] tipc_bcast_rcv+0xa2/0x190 [tipc] [] tipc_node_bc_rcv+0x8b/0x200 [tipc] [] tipc_rcv+0x3af/0x5b0 [tipc] [] tipc_udp_recv+0xc7/0x1e0 [tipc] It was caused by the 'l' passed into tipc_bcast_rcv() is NULL. When it creates a node in tipc_node_check_dest(), after inserting the new node into hashtable in tipc_node_create(), it creates the bc link. However, there is a gap between this insert and bc link creation, a bc packet may come in and get the node from the hashtable then try to dereference its bc link, which is NULL. This patch is to fix it by moving the bc link creation before inserting into the hashtable. Note that for a preliminary node becoming "real", the bc link creation should also be called before it's rehashed, as we don't create it for preliminary nodes.

AI-Powered Analysis

AILast updated: 06/28/2025, 00:55:04 UTC

Technical Analysis

CVE-2022-49664 is a vulnerability identified in the Linux kernel's Transparent Inter-Process Communication (TIPC) protocol implementation. The issue arises from a NULL pointer dereference in the tipc_link_is_up function, triggered when the broadcast (bc) link creation is delayed until after a new node is inserted into the hashtable. Specifically, when a preliminary node is created via tipc_node_create, the bc link is not immediately established. This creates a timing window where a broadcast packet can be received and the node retrieved from the hashtable, but its bc link pointer remains NULL. Dereferencing this NULL pointer leads to a kernel crash (NULL pointer dereference), causing a denial of service (DoS) condition. The root cause is a race condition between node insertion and bc link creation. The patch fixes this by moving the bc link creation to occur before the node is inserted into the hashtable, ensuring that any access to the node's bc link is valid. Additionally, for preliminary nodes transitioning to real nodes, the bc link creation is also ensured before rehashing. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating it is present in certain recent kernel builds. No known exploits are reported in the wild as of the publication date. The vulnerability does not have an assigned CVSS score yet. Exploitation requires crafted network packets targeting the TIPC protocol, which is primarily used in clustered or telecom environments. The impact is a kernel crash leading to system unavailability.

Potential Impact

For European organizations, the impact of CVE-2022-49664 depends largely on the deployment of Linux systems using the TIPC protocol. TIPC is commonly used in clustered environments, telecom infrastructure, and certain industrial systems. Organizations operating telecom networks, industrial control systems, or high-availability clusters running vulnerable Linux kernel versions could experience denial of service due to kernel crashes triggered remotely by crafted TIPC broadcast packets. This could lead to service outages, affecting critical infrastructure and business continuity. The vulnerability does not appear to allow privilege escalation or remote code execution, so confidentiality and integrity impacts are limited. However, availability impact is significant in environments relying on TIPC for inter-node communication. European telecom operators, industrial manufacturers, and cloud providers using Linux clusters could be at risk. The lack of known exploits reduces immediate risk but patching is important to prevent potential future attacks. Systems exposed to untrusted networks or with insufficient network segmentation are more vulnerable to remote exploitation attempts.

Mitigation Recommendations

1. Apply the official Linux kernel patch that moves the bc link creation before node insertion into the hashtable as soon as it is available for your kernel version. 2. Upgrade Linux kernels to versions that include the fix for CVE-2022-49664. 3. Restrict network access to TIPC ports and interfaces to trusted hosts only, using firewall rules or network segmentation to limit exposure to untrusted networks. 4. Monitor kernel logs for signs of NULL pointer dereference crashes related to tipc to detect potential exploitation attempts. 5. For critical telecom or industrial systems, consider isolating TIPC traffic within secure VLANs or dedicated networks to reduce attack surface. 6. Conduct regular vulnerability assessments and patch management to ensure timely updates of Linux kernel components. 7. If upgrading kernels is not immediately feasible, consider disabling TIPC if it is not required for your environment to eliminate the attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.435Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd716

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 12:55:04 AM

Last updated: 8/11/2025, 3:42:55 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats