Skip to main content

CVE-2022-49865: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49865cvecve-2022-49865
Published: Thu May 01 2025 (05/01/2025, 14:10:17 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network When copying a `struct ifaddrlblmsg` to the network, __ifal_reserved remained uninitialized, resulting in a 1-byte infoleak: BUG: KMSAN: kernel-network-infoleak in __netdev_start_xmit ./include/linux/netdevice.h:4841 __netdev_start_xmit ./include/linux/netdevice.h:4841 netdev_start_xmit ./include/linux/netdevice.h:4857 xmit_one net/core/dev.c:3590 dev_hard_start_xmit+0x1dc/0x800 net/core/dev.c:3606 __dev_queue_xmit+0x17e8/0x4350 net/core/dev.c:4256 dev_queue_xmit ./include/linux/netdevice.h:3009 __netlink_deliver_tap_skb net/netlink/af_netlink.c:307 __netlink_deliver_tap+0x728/0xad0 net/netlink/af_netlink.c:325 netlink_deliver_tap net/netlink/af_netlink.c:338 __netlink_sendskb net/netlink/af_netlink.c:1263 netlink_sendskb+0x1d9/0x200 net/netlink/af_netlink.c:1272 netlink_unicast+0x56d/0xf50 net/netlink/af_netlink.c:1360 nlmsg_unicast ./include/net/netlink.h:1061 rtnl_unicast+0x5a/0x80 net/core/rtnetlink.c:758 ip6addrlbl_get+0xfad/0x10f0 net/ipv6/addrlabel.c:628 rtnetlink_rcv_msg+0xb33/0x1570 net/core/rtnetlink.c:6082 ... Uninit was created at: slab_post_alloc_hook+0x118/0xb00 mm/slab.h:742 slab_alloc_node mm/slub.c:3398 __kmem_cache_alloc_node+0x4f2/0x930 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 __kmalloc_node_track_caller+0x117/0x3d0 mm/slab_common.c:975 kmalloc_reserve net/core/skbuff.c:437 __alloc_skb+0x27a/0xab0 net/core/skbuff.c:509 alloc_skb ./include/linux/skbuff.h:1267 nlmsg_new ./include/net/netlink.h:964 ip6addrlbl_get+0x490/0x10f0 net/ipv6/addrlabel.c:608 rtnetlink_rcv_msg+0xb33/0x1570 net/core/rtnetlink.c:6082 netlink_rcv_skb+0x299/0x550 net/netlink/af_netlink.c:2540 rtnetlink_rcv+0x26/0x30 net/core/rtnetlink.c:6109 netlink_unicast_kernel net/netlink/af_netlink.c:1319 netlink_unicast+0x9ab/0xf50 net/netlink/af_netlink.c:1345 netlink_sendmsg+0xebc/0x10f0 net/netlink/af_netlink.c:1921 ... This patch ensures that the reserved field is always initialized.

AI-Powered Analysis

AILast updated: 06/30/2025, 02:41:31 UTC

Technical Analysis

CVE-2022-49865 is a vulnerability identified in the Linux kernel's IPv6 address labeling subsystem. Specifically, the flaw exists in the handling of the struct ifaddrlblmsg, which is used to communicate address label information over the network. The vulnerability arises because the __ifal_reserved field within this structure was left uninitialized when copied to the network. This results in a one-byte information leak, where potentially sensitive kernel memory contents could be exposed unintentionally. The issue was detected by Kernel Memory Sanitizer (KMSAN) during the transmission of network packets, indicating that uninitialized memory was being sent out. The root cause is that the reserved field was not explicitly initialized before being sent, allowing residual data from kernel memory to leak. The patch for this vulnerability ensures that the reserved field is always properly initialized before transmission, thereby preventing the leakage of kernel memory contents. The vulnerability affects Linux kernel versions identified by the commit hash 2a8cc6c89039e0530a3335954253b76ed0f9339a and similar versions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical in nature and relates to kernel networking internals, specifically the netlink interface used for network configuration and management.

Potential Impact

For European organizations, the impact of CVE-2022-49865 is primarily related to confidentiality risks. The information leak could allow an attacker with the ability to send crafted network messages to glean small amounts of kernel memory data, which might include sensitive information or aid in further exploitation. Although the leak is limited to one byte per message, repeated exploitation could potentially allow reconstruction of sensitive kernel memory contents. This could facilitate advanced attacks such as kernel address space layout randomization (KASLR) bypass or other privilege escalation techniques. The vulnerability does not directly allow code execution or denial of service but can be a stepping stone for more severe attacks. Organizations running Linux servers, especially those exposing IPv6 networking and using netlink interfaces for network management, are at risk. This includes cloud providers, data centers, telecom infrastructure, and enterprise Linux deployments common in Europe. The vulnerability's exploitation requires network-level access and the ability to send netlink messages, which may be limited to local or privileged users depending on system configuration. However, in multi-tenant or containerized environments, the risk could be higher if isolation is weak. Overall, the impact is moderate but should not be underestimated due to the potential for information disclosure aiding further attacks.

Mitigation Recommendations

To mitigate CVE-2022-49865, European organizations should: 1) Apply the official Linux kernel patches that initialize the __ifal_reserved field in struct ifaddrlblmsg as soon as they become available from their Linux distribution vendors. 2) Ensure that all Linux systems, especially those exposed to untrusted networks or running multi-tenant workloads, are updated to kernel versions including this fix. 3) Restrict access to netlink interfaces to trusted users and processes only, using appropriate Linux capabilities and security modules (e.g., SELinux, AppArmor) to limit who can send netlink messages. 4) Monitor network traffic and system logs for unusual netlink message activity that could indicate attempts to exploit this vulnerability. 5) Employ network segmentation and firewall rules to limit exposure of IPv6 management interfaces to untrusted networks. 6) For environments using containers or virtual machines, enforce strict isolation and limit capabilities that allow raw netlink message sending. 7) Conduct regular security audits and vulnerability scans to detect outdated kernels and vulnerable systems. These steps go beyond generic patching advice by emphasizing access control to netlink interfaces and monitoring for exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.237Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4e9d

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 2:41:31 AM

Last updated: 7/26/2025, 12:07:00 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats