
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49374 is a vulnerability in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem that was discovered and reported by syzbot. The issue involves an uninitialized value access in the bearer name validation functionality, specifically in the string handling routines of the kernel's vsprintf implementation (NVD).
The vulnerability manifests in the tipcenablebearer function within net/tipc/bearer.c. The issue occurs during string handling operations, specifically in the stringnocheck function (lib/vsprintf.c:644) and related string operations. The bug was triggered in the call chain through tipcnlbearerenable and _tipcnlbearerenable functions when processing bearer names (Kernel Commit).
The vulnerability could lead to information disclosure through uninitialized memory access when processing TIPC bearer names. This could potentially expose sensitive kernel memory contents to unauthorized users (NVD).
The issue was fixed by implementing proper attribute length checking for TIPC bearer names and improving error handling in the bearer name validation process. The fix removes the use of 'illegal name' in printing messages and adds proper sanity checks for the TIPCNLABEARER_NAME attribute length (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."