CVE-2022-49664: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: tipc: move bc link creation back to tipc_node_create Shuang Li reported a NULL pointer dereference crash: [] BUG: kernel NULL pointer dereference, address: 0000000000000068 [] RIP: 0010:tipc_link_is_up+0x5/0x10 [tipc] [] Call Trace: [] <IRQ> [] tipc_bcast_rcv+0xa2/0x190 [tipc] [] tipc_node_bc_rcv+0x8b/0x200 [tipc] [] tipc_rcv+0x3af/0x5b0 [tipc] [] tipc_udp_recv+0xc7/0x1e0 [tipc] It was caused by the 'l' passed into tipc_bcast_rcv() is NULL. When it creates a node in tipc_node_check_dest(), after inserting the new node into hashtable in tipc_node_create(), it creates the bc link. However, there is a gap between this insert and bc link creation, a bc packet may come in and get the node from the hashtable then try to dereference its bc link, which is NULL. This patch is to fix it by moving the bc link creation before inserting into the hashtable. Note that for a preliminary node becoming "real", the bc link creation should also be called before it's rehashed, as we don't create it for preliminary nodes.
AI Analysis
Technical Summary
CVE-2022-49664 is a vulnerability identified in the Linux kernel's Transparent Inter-Process Communication (TIPC) protocol implementation. The issue arises from a NULL pointer dereference in the tipc_link_is_up function, triggered when the broadcast (bc) link creation is delayed until after a new node is inserted into the hashtable. Specifically, when a preliminary node is created via tipc_node_create, the bc link is not immediately established. This creates a timing window where a broadcast packet can be received and the node retrieved from the hashtable, but its bc link pointer remains NULL. Dereferencing this NULL pointer leads to a kernel crash (NULL pointer dereference), causing a denial of service (DoS) condition. The root cause is a race condition between node insertion and bc link creation. The patch fixes this by moving the bc link creation to occur before the node is inserted into the hashtable, ensuring that any access to the node's bc link is valid. Additionally, for preliminary nodes transitioning to real nodes, the bc link creation is also ensured before rehashing. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating it is present in certain recent kernel builds. No known exploits are reported in the wild as of the publication date. The vulnerability does not have an assigned CVSS score yet. Exploitation requires crafted network packets targeting the TIPC protocol, which is primarily used in clustered or telecom environments. The impact is a kernel crash leading to system unavailability.
Potential Impact
For European organizations, the impact of CVE-2022-49664 depends largely on the deployment of Linux systems using the TIPC protocol. TIPC is commonly used in clustered environments, telecom infrastructure, and certain industrial systems. Organizations operating telecom networks, industrial control systems, or high-availability clusters running vulnerable Linux kernel versions could experience denial of service due to kernel crashes triggered remotely by crafted TIPC broadcast packets. This could lead to service outages, affecting critical infrastructure and business continuity. The vulnerability does not appear to allow privilege escalation or remote code execution, so confidentiality and integrity impacts are limited. However, availability impact is significant in environments relying on TIPC for inter-node communication. European telecom operators, industrial manufacturers, and cloud providers using Linux clusters could be at risk. The lack of known exploits reduces immediate risk but patching is important to prevent potential future attacks. Systems exposed to untrusted networks or with insufficient network segmentation are more vulnerable to remote exploitation attempts.
Mitigation Recommendations
1. Apply the official Linux kernel patch that moves the bc link creation before node insertion into the hashtable as soon as it is available for your kernel version. 2. Upgrade Linux kernels to versions that include the fix for CVE-2022-49664. 3. Restrict network access to TIPC ports and interfaces to trusted hosts only, using firewall rules or network segmentation to limit exposure to untrusted networks. 4. Monitor kernel logs for signs of NULL pointer dereference crashes related to tipc to detect potential exploitation attempts. 5. For critical telecom or industrial systems, consider isolating TIPC traffic within secure VLANs or dedicated networks to reduce attack surface. 6. Conduct regular vulnerability assessments and patch management to ensure timely updates of Linux kernel components. 7. If upgrading kernels is not immediately feasible, consider disabling TIPC if it is not required for your environment to eliminate the attack vector.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland
CVE-2022-49664: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: tipc: move bc link creation back to tipc_node_create Shuang Li reported a NULL pointer dereference crash: [] BUG: kernel NULL pointer dereference, address: 0000000000000068 [] RIP: 0010:tipc_link_is_up+0x5/0x10 [tipc] [] Call Trace: [] <IRQ> [] tipc_bcast_rcv+0xa2/0x190 [tipc] [] tipc_node_bc_rcv+0x8b/0x200 [tipc] [] tipc_rcv+0x3af/0x5b0 [tipc] [] tipc_udp_recv+0xc7/0x1e0 [tipc] It was caused by the 'l' passed into tipc_bcast_rcv() is NULL. When it creates a node in tipc_node_check_dest(), after inserting the new node into hashtable in tipc_node_create(), it creates the bc link. However, there is a gap between this insert and bc link creation, a bc packet may come in and get the node from the hashtable then try to dereference its bc link, which is NULL. This patch is to fix it by moving the bc link creation before inserting into the hashtable. Note that for a preliminary node becoming "real", the bc link creation should also be called before it's rehashed, as we don't create it for preliminary nodes.
AI-Powered Analysis
Technical Analysis
CVE-2022-49664 is a vulnerability identified in the Linux kernel's Transparent Inter-Process Communication (TIPC) protocol implementation. The issue arises from a NULL pointer dereference in the tipc_link_is_up function, triggered when the broadcast (bc) link creation is delayed until after a new node is inserted into the hashtable. Specifically, when a preliminary node is created via tipc_node_create, the bc link is not immediately established. This creates a timing window where a broadcast packet can be received and the node retrieved from the hashtable, but its bc link pointer remains NULL. Dereferencing this NULL pointer leads to a kernel crash (NULL pointer dereference), causing a denial of service (DoS) condition. The root cause is a race condition between node insertion and bc link creation. The patch fixes this by moving the bc link creation to occur before the node is inserted into the hashtable, ensuring that any access to the node's bc link is valid. Additionally, for preliminary nodes transitioning to real nodes, the bc link creation is also ensured before rehashing. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes, indicating it is present in certain recent kernel builds. No known exploits are reported in the wild as of the publication date. The vulnerability does not have an assigned CVSS score yet. Exploitation requires crafted network packets targeting the TIPC protocol, which is primarily used in clustered or telecom environments. The impact is a kernel crash leading to system unavailability.
Potential Impact
For European organizations, the impact of CVE-2022-49664 depends largely on the deployment of Linux systems using the TIPC protocol. TIPC is commonly used in clustered environments, telecom infrastructure, and certain industrial systems. Organizations operating telecom networks, industrial control systems, or high-availability clusters running vulnerable Linux kernel versions could experience denial of service due to kernel crashes triggered remotely by crafted TIPC broadcast packets. This could lead to service outages, affecting critical infrastructure and business continuity. The vulnerability does not appear to allow privilege escalation or remote code execution, so confidentiality and integrity impacts are limited. However, availability impact is significant in environments relying on TIPC for inter-node communication. European telecom operators, industrial manufacturers, and cloud providers using Linux clusters could be at risk. The lack of known exploits reduces immediate risk but patching is important to prevent potential future attacks. Systems exposed to untrusted networks or with insufficient network segmentation are more vulnerable to remote exploitation attempts.
Mitigation Recommendations
1. Apply the official Linux kernel patch that moves the bc link creation before node insertion into the hashtable as soon as it is available for your kernel version. 2. Upgrade Linux kernels to versions that include the fix for CVE-2022-49664. 3. Restrict network access to TIPC ports and interfaces to trusted hosts only, using firewall rules or network segmentation to limit exposure to untrusted networks. 4. Monitor kernel logs for signs of NULL pointer dereference crashes related to tipc to detect potential exploitation attempts. 5. For critical telecom or industrial systems, consider isolating TIPC traffic within secure VLANs or dedicated networks to reduce attack surface. 6. Conduct regular vulnerability assessments and patch management to ensure timely updates of Linux kernel components. 7. If upgrading kernels is not immediately feasible, consider disabling TIPC if it is not required for your environment to eliminate the attack vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.435Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9821c4522896dcbdd716
Added to database: 5/21/2025, 9:08:49 AM
Last enriched: 6/28/2025, 12:55:04 AM
Last updated: 8/11/2025, 3:42:55 AM
Views: 14
Related Threats
CVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-31987: CWE-405 Asymmetric Resource Consumption in HCL Software Connections Docs
MediumCVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8984: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8983: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.