Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-45887: n/a in n/a

0
Medium
VulnerabilityCVE-2022-45887cvecve-2022-45887n-acwe-362cwe-772
Published: Fri Nov 25 2022 (11/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.

AI-Powered Analysis

AILast updated: 06/24/2025, 15:26:47 UTC

Technical Analysis

CVE-2022-45887 is a medium-severity vulnerability identified in the Linux kernel versions up to 6.0.9, specifically within the USB driver for the ttusb-dec device (drivers/media/usb/ttusb-dec/ttusb_dec.c). The issue arises due to a memory leak caused by the absence of a call to dvb_frontend_detach, which is responsible for properly releasing resources associated with the DVB frontend device. This memory leak can lead to resource exhaustion over time if the affected driver is repeatedly initialized and torn down without proper cleanup. The vulnerability is categorized under CWE-362 (Race Condition) and CWE-772 (Missing Release of Resource after Effective Lifetime), indicating that improper resource management and potential concurrency issues contribute to the problem. The CVSS v3.1 score is 4.7 (medium), with the vector AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, meaning the attack requires local access with low privileges, high attack complexity, no user interaction, and impacts availability only. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though it is likely that kernel maintainers have addressed or will address this issue in subsequent releases. The vulnerability does not affect confidentiality or integrity but can degrade system availability through memory exhaustion, potentially causing denial of service on affected systems using the ttusb-dec USB device driver.

Potential Impact

For European organizations, the impact of CVE-2022-45887 is primarily related to system availability. Organizations that deploy Linux systems with the affected kernel versions and utilize USB devices relying on the ttusb-dec driver—commonly used for DVB (Digital Video Broadcasting) USB devices—may experience memory leaks leading to degraded performance or system crashes. This can disrupt services dependent on these devices, such as media streaming, broadcasting, or other multimedia applications. While the scope of affected systems is relatively narrow due to the specific driver involved, critical infrastructure or media companies using Linux-based DVB USB devices could face operational interruptions. The requirement for local access and low privileges limits remote exploitation, reducing risk from external attackers but increasing concern for insider threats or compromised internal systems. Given the high attack complexity, exploitation is not trivial, but persistent exploitation attempts could cause denial of service conditions. The lack of impact on confidentiality and integrity reduces risks related to data breaches or unauthorized modifications.

Mitigation Recommendations

To mitigate CVE-2022-45887, European organizations should: 1) Identify Linux systems running kernel versions up to 6.0.9 that have the ttusb-dec driver loaded, particularly those using DVB USB devices. 2) Upgrade the Linux kernel to a version where this vulnerability is patched; monitor kernel release notes and security advisories for updates addressing this issue. 3) If immediate kernel upgrades are not feasible, consider unloading the ttusb-dec driver or disabling the affected USB DVB devices where possible to prevent exploitation. 4) Implement monitoring for unusual memory usage patterns or system instability on affected hosts to detect potential exploitation attempts. 5) Restrict local access to trusted users only, enforce strict privilege separation, and audit local user activities to reduce the risk of exploitation by low-privilege users. 6) Employ system hardening measures such as mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of processes to interact with vulnerable drivers. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service conditions caused by memory exhaustion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-25T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefeff

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 3:26:47 PM

Last updated: 2/7/2026, 1:15:14 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats