Skip to main content

CVE-2022-49863: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49863cvecve-2022-49863
Published: Thu May 01 2025 (05/01/2025, 14:10:16 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: can: af_can: fix NULL pointer dereference in can_rx_register() It causes NULL pointer dereference when testing as following: (a) use syscall(__NR_socket, 0x10ul, 3ul, 0) to create netlink socket. (b) use syscall(__NR_sendmsg, ...) to create bond link device and vxcan link device, and bind vxcan device to bond device (can also use ifenslave command to bind vxcan device to bond device). (c) use syscall(__NR_socket, 0x1dul, 3ul, 1) to create CAN socket. (d) use syscall(__NR_bind, ...) to bind the bond device to CAN socket. The bond device invokes the can-raw protocol registration interface to receive CAN packets. However, ml_priv is not allocated to the dev, dev_rcv_lists is assigned to NULL in can_rx_register(). In this case, it will occur the NULL pointer dereference issue. The following is the stack information: BUG: kernel NULL pointer dereference, address: 0000000000000008 PGD 122a4067 P4D 122a4067 PUD 1223c067 PMD 0 Oops: 0000 [#1] PREEMPT SMP RIP: 0010:can_rx_register+0x12d/0x1e0 Call Trace: <TASK> raw_enable_filters+0x8d/0x120 raw_enable_allfilters+0x3b/0x130 raw_bind+0x118/0x4f0 __sys_bind+0x163/0x1a0 __x64_sys_bind+0x1e/0x30 do_syscall_64+0x35/0x80 entry_SYSCALL_64_after_hwframe+0x63/0xcd </TASK>

AI-Powered Analysis

AILast updated: 06/28/2025, 00:56:43 UTC

Technical Analysis

CVE-2022-49863 is a vulnerability in the Linux kernel's CAN (Controller Area Network) subsystem, specifically within the af_can module responsible for CAN socket operations. The flaw arises due to a NULL pointer dereference in the function can_rx_register(). The vulnerability manifests when a sequence of system calls is executed: first, a netlink socket is created; then, a bond link device and a vxcan link device are created and bound together; next, a CAN socket is created; finally, the bond device is bound to the CAN socket. During this process, the bond device invokes the can-raw protocol registration interface to receive CAN packets. However, the kernel fails to allocate the ml_priv structure to the device, resulting in the dev_rcv_lists pointer being set to NULL. When can_rx_register() attempts to access this NULL pointer, a kernel NULL pointer dereference occurs, leading to a kernel oops and potential system crash or denial of service. The stack trace indicates the fault occurs at can_rx_register+0x12d, triggered by raw_bind and subsequent socket bind system calls. This vulnerability affects multiple Linux kernel versions identified by specific commit hashes. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability requires local system calls to be executed in a specific order, implying that an attacker needs local access and the ability to create and bind CAN and netlink sockets. The issue impacts kernel stability and availability but does not directly indicate privilege escalation or data confidentiality compromise.

Potential Impact

For European organizations, the impact of CVE-2022-49863 primarily concerns systems running Linux kernels with affected versions that utilize CAN networking features. CAN is widely used in automotive, industrial control systems, and embedded devices, which are prevalent in sectors such as manufacturing, automotive engineering, and critical infrastructure. A successful exploitation could cause kernel crashes leading to denial of service on affected devices, potentially disrupting operations in environments relying on CAN communication. While the vulnerability does not appear to allow privilege escalation or remote code execution, the resulting system instability could affect availability of critical systems. Organizations deploying Linux-based embedded systems, IoT devices, or automotive control units in Europe should be particularly vigilant. Disruptions in industrial or automotive environments could have safety implications or cause operational downtime. Additionally, since exploitation requires local access and specific socket operations, the threat is more relevant to insiders or attackers with initial foothold rather than remote attackers without access.

Mitigation Recommendations

To mitigate CVE-2022-49863, European organizations should: 1) Apply kernel patches or updates from Linux distributions as soon as they become available that address the NULL pointer dereference in can_rx_register(). 2) Restrict local user permissions to prevent unauthorized creation and binding of CAN and netlink sockets, limiting access to trusted users and processes only. 3) Monitor systems for unusual socket creation or binding activities related to CAN interfaces, which may indicate attempts to exploit this vulnerability. 4) In environments where CAN networking is not required, consider disabling the af_can module or related CAN socket functionalities to reduce the attack surface. 5) For embedded or automotive Linux systems, coordinate with vendors to ensure firmware updates include the fix. 6) Implement robust system integrity and availability monitoring to detect kernel crashes or oops events promptly. 7) Conduct internal audits to identify systems running vulnerable kernel versions and prioritize patching based on criticality and exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.236Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd769

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 12:56:43 AM

Last updated: 7/28/2025, 12:58:53 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats