CVE-2022-49374
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49374 is a vulnerability in the Linux kernel's TIPC (Transparent Inter-Process Communication) subsystem that was discovered and reported by syzbot. The issue involves an uninitialized value access in the bearer name validation functionality, specifically in the string handling routines of the kernel's vsprintf implementation (NVD).

Technical details

The vulnerability manifests in the tipcenablebearer function within net/tipc/bearer.c. The issue occurs during string handling operations, specifically in the stringnocheck function (lib/vsprintf.c:644) and related string operations. The bug was triggered in the call chain through tipcnlbearerenable and _tipcnlbearerenable functions when processing bearer names (Kernel Commit).

Impact

The vulnerability could lead to information disclosure through uninitialized memory access when processing TIPC bearer names. This could potentially expose sensitive kernel memory contents to unauthorized users (NVD).

Mitigation and workarounds

The issue was fixed by implementing proper attribute length checking for TIPC bearer names and improving error handling in the bearer name validation process. The fix removes the use of 'illegal name' in printing messages and adds proper sanity checks for the TIPCNLABEARER_NAME attribute length (Kernel Commit).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-gcp-5.4
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-gcp-6.8
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-extra
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management