Bug 2348070 (CVE-2022-49664) - CVE-2022-49664 kernel: tipc: move bc link creation back to tipc_node_create
Summary: CVE-2022-49664 kernel: tipc: move bc link creation back to tipc_node_create
Keywords:
Status: NEW
Alias: CVE-2022-49664
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-26 03:16 UTC by OSIDB Bzimport
Modified: 2025-04-03 17:51 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-26 03:16:35 UTC
In the Linux kernel, the following vulnerability has been resolved:

tipc: move bc link creation back to tipc_node_create

Shuang Li reported a NULL pointer dereference crash:

  [] BUG: kernel NULL pointer dereference, address: 0000000000000068
  [] RIP: 0010:tipc_link_is_up+0x5/0x10 [tipc]
  [] Call Trace:
  []  <IRQ>
  []  tipc_bcast_rcv+0xa2/0x190 [tipc]
  []  tipc_node_bc_rcv+0x8b/0x200 [tipc]
  []  tipc_rcv+0x3af/0x5b0 [tipc]
  []  tipc_udp_recv+0xc7/0x1e0 [tipc]

It was caused by the 'l' passed into tipc_bcast_rcv() is NULL. When it
creates a node in tipc_node_check_dest(), after inserting the new node
into hashtable in tipc_node_create(), it creates the bc link. However,
there is a gap between this insert and bc link creation, a bc packet
may come in and get the node from the hashtable then try to dereference
its bc link, which is NULL.

This patch is to fix it by moving the bc link creation before inserting
into the hashtable.

Note that for a preliminary node becoming "real", the bc link creation
should also be called before it's rehashed, as we don't create it for
preliminary nodes.

Comment 1 Avinash Hanwate 2025-02-26 11:31:56 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49664-d3af@gregkh/T

Comment 4 Avinash Hanwate 2025-02-27 19:34:11 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49664-d3af@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.