Skip to main content

CVE-2022-49904: Vulnerability in Linux Linux

High
VulnerabilityCVE-2022-49904cvecve-2022-49904
Published: Thu May 01 2025 (05/01/2025, 14:10:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net, neigh: Fix null-ptr-deref in neigh_table_clear() When IPv6 module gets initialized but hits an error in the middle, kenel panic with: KASAN: null-ptr-deref in range [0x0000000000000598-0x000000000000059f] CPU: 1 PID: 361 Comm: insmod Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) RIP: 0010:__neigh_ifdown.isra.0+0x24b/0x370 RSP: 0018:ffff888012677908 EFLAGS: 00000202 ... Call Trace: <TASK> neigh_table_clear+0x94/0x2d0 ndisc_cleanup+0x27/0x40 [ipv6] inet6_init+0x21c/0x2cb [ipv6] do_one_initcall+0xd3/0x4d0 do_init_module+0x1ae/0x670 ... Kernel panic - not syncing: Fatal exception When ipv6 initialization fails, it will try to cleanup and calls: neigh_table_clear() neigh_ifdown(tbl, NULL) pneigh_queue_purge(&tbl->proxy_queue, dev_net(dev == NULL)) # dev_net(NULL) triggers null-ptr-deref. Fix it by passing NULL to pneigh_queue_purge() in neigh_ifdown() if dev is NULL, to make kernel not panic immediately.

AI-Powered Analysis

AILast updated: 06/28/2025, 01:09:50 UTC

Technical Analysis

CVE-2022-49904 is a vulnerability in the Linux kernel related to the IPv6 network module initialization process. Specifically, the flaw occurs during the cleanup phase when the IPv6 module initialization fails. The vulnerability is a null pointer dereference in the neigh_table_clear() function, which is called as part of the neighbor table cleanup. When the IPv6 module initialization encounters an error, the kernel attempts to clean up by calling neigh_table_clear(), which in turn calls neigh_ifdown(tbl, NULL). This leads to a call to pneigh_queue_purge(&tbl->proxy_queue, dev_net(dev == NULL)). Since dev is NULL, dev_net(NULL) triggers a null pointer dereference, causing a kernel panic. This kernel panic results in a fatal exception and system crash, impacting system availability. The root cause is that the code does not properly handle the case where the device pointer is NULL during cleanup, leading to an immediate kernel panic. The fix involves modifying neigh_ifdown() to pass NULL safely to pneigh_queue_purge() when dev is NULL, preventing the null pointer dereference and subsequent panic. This vulnerability affects multiple Linux kernel versions as identified by the affected commit hashes. The issue is triggered during module initialization failure scenarios, which may be rare but can occur due to various reasons such as hardware or configuration issues. No known exploits are reported in the wild as of the publication date. The vulnerability does not require user interaction or authentication to trigger if the IPv6 module initialization fails, which could happen during system boot or module loading. The impact is primarily a denial of service via kernel panic, causing system unavailability until rebooted. The vulnerability is technical and specific to the Linux kernel's network neighbor subsystem and IPv6 module initialization and cleanup routines.

Potential Impact

For European organizations, the impact of CVE-2022-49904 centers on potential denial of service conditions on Linux systems running vulnerable kernel versions. Many European enterprises, governments, and service providers rely heavily on Linux servers and infrastructure, including cloud environments, network appliances, and embedded systems. A kernel panic triggered by this vulnerability could cause unexpected system crashes, leading to downtime, disruption of critical services, and potential loss of availability for applications relying on IPv6 networking. This is particularly relevant for organizations with IPv6 enabled or those using dynamic module loading. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can affect business continuity, especially in sectors like finance, telecommunications, healthcare, and public administration where Linux systems are prevalent. Additionally, recovery from kernel panics may require manual intervention or automated failover mechanisms, which if not properly configured, could increase operational risk. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits targeting this flaw. Organizations using Linux kernels with the affected versions should prioritize patching to avoid service interruptions. The vulnerability also has implications for embedded Linux devices and network equipment used in European critical infrastructure, where stability is paramount.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2022-49904 as soon as they become available from trusted sources such as the Linux kernel mailing list or vendor security advisories. 2. For distributions that backport fixes, ensure that the system is updated to the latest kernel packages provided by the vendor. 3. Monitor system logs for kernel panic events related to IPv6 module initialization failures to detect potential triggering conditions. 4. Disable IPv6 module loading if IPv6 is not required in the environment, reducing the attack surface and exposure to this vulnerability. 5. Implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel panics, such as automated reboots or failover clustering. 6. Conduct thorough testing of kernel updates in staging environments before deployment to production to ensure stability. 7. For embedded or specialized Linux systems, coordinate with device vendors to obtain patched firmware or kernel updates. 8. Review and harden kernel module loading policies to prevent unauthorized or unexpected module insertions that could trigger the vulnerability. 9. Maintain an inventory of Linux kernel versions in use across the organization to identify vulnerable systems promptly. 10. Educate system administrators about this vulnerability and the importance of timely patching and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.245Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9821c4522896dcbdd77d

Added to database: 5/21/2025, 9:08:49 AM

Last enriched: 6/28/2025, 1:09:50 AM

Last updated: 7/31/2025, 1:09:28 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats