CVE-2022-48720: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: macsec: Fix offload support for NETDEV_UNREGISTER event Current macsec netdev notify handler handles NETDEV_UNREGISTER event by releasing relevant SW resources only, this causes resources leak in case of macsec HW offload, as the underlay driver was not notified to clean it's macsec offload resources. Fix by calling the underlay driver to clean it's relevant resources by moving offload handling from macsec_dellink() to macsec_common_dellink() when handling NETDEV_UNREGISTER event.
AI Analysis
Technical Summary
CVE-2022-48720 is a vulnerability identified in the Linux kernel's MACsec (Media Access Control Security) implementation, specifically related to the handling of the NETDEV_UNREGISTER event. MACsec is a security protocol that provides secure communication on Ethernet links by encrypting and authenticating data at the MAC layer. The vulnerability arises because the current MACsec network device notification handler only releases software (SW) resources when a network device is unregistered (NETDEV_UNREGISTER event). However, it fails to notify the underlying hardware (HW) offload driver to clean up its MACsec offload resources. This leads to a resource leak in cases where MACsec hardware offloading is used. The root cause is that the offload handling was performed in the macsec_dellink() function, which does not cover the NETDEV_UNREGISTER event properly. The fix involves moving the offload handling to macsec_common_dellink(), ensuring that when a network device is unregistered, the underlying driver is correctly informed to release its hardware offload resources. This correction prevents resource leaks that could degrade system performance or stability over time. The affected Linux kernel versions are identified by specific commit hashes, indicating that this is a source-level vulnerability affecting certain kernel builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux systems with MACsec hardware offload capabilities, this vulnerability could lead to resource leaks in network devices when they are unregistered. Over time, such leaks may cause degraded network performance, increased latency, or even system instability, particularly in environments with frequent network device reconfigurations or dynamic network topologies such as data centers, telecom infrastructure, or cloud providers. Confidentiality and integrity of data are not directly compromised by this vulnerability, as it does not involve bypassing encryption or authentication mechanisms. However, availability could be impacted due to resource exhaustion leading to potential denial of service conditions or degraded network throughput. Organizations with high network security requirements using MACsec offload hardware may experience operational disruptions if this issue is not addressed. Given the lack of known exploits, the immediate risk is moderate, but the potential for indirect impact on availability in critical infrastructure is notable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly update their Linux kernel to a version that includes the fix for CVE-2022-48720. Specifically, they should ensure that their kernel source or binary packages incorporate the patch that moves offload handling to macsec_common_dellink() for proper resource cleanup. Network administrators should audit their systems to identify usage of MACsec hardware offload features and monitor network device unregister events for abnormal resource consumption or performance degradation. In environments where immediate patching is not feasible, temporarily disabling MACsec hardware offload could reduce the risk of resource leaks, though this may impact network performance. Additionally, implementing robust monitoring and alerting on network device resource usage can help detect early signs of resource exhaustion. Coordination with hardware vendors to confirm compatibility with patched kernel versions is also recommended to avoid regressions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark
CVE-2022-48720: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: macsec: Fix offload support for NETDEV_UNREGISTER event Current macsec netdev notify handler handles NETDEV_UNREGISTER event by releasing relevant SW resources only, this causes resources leak in case of macsec HW offload, as the underlay driver was not notified to clean it's macsec offload resources. Fix by calling the underlay driver to clean it's relevant resources by moving offload handling from macsec_dellink() to macsec_common_dellink() when handling NETDEV_UNREGISTER event.
AI-Powered Analysis
Technical Analysis
CVE-2022-48720 is a vulnerability identified in the Linux kernel's MACsec (Media Access Control Security) implementation, specifically related to the handling of the NETDEV_UNREGISTER event. MACsec is a security protocol that provides secure communication on Ethernet links by encrypting and authenticating data at the MAC layer. The vulnerability arises because the current MACsec network device notification handler only releases software (SW) resources when a network device is unregistered (NETDEV_UNREGISTER event). However, it fails to notify the underlying hardware (HW) offload driver to clean up its MACsec offload resources. This leads to a resource leak in cases where MACsec hardware offloading is used. The root cause is that the offload handling was performed in the macsec_dellink() function, which does not cover the NETDEV_UNREGISTER event properly. The fix involves moving the offload handling to macsec_common_dellink(), ensuring that when a network device is unregistered, the underlying driver is correctly informed to release its hardware offload resources. This correction prevents resource leaks that could degrade system performance or stability over time. The affected Linux kernel versions are identified by specific commit hashes, indicating that this is a source-level vulnerability affecting certain kernel builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux systems with MACsec hardware offload capabilities, this vulnerability could lead to resource leaks in network devices when they are unregistered. Over time, such leaks may cause degraded network performance, increased latency, or even system instability, particularly in environments with frequent network device reconfigurations or dynamic network topologies such as data centers, telecom infrastructure, or cloud providers. Confidentiality and integrity of data are not directly compromised by this vulnerability, as it does not involve bypassing encryption or authentication mechanisms. However, availability could be impacted due to resource exhaustion leading to potential denial of service conditions or degraded network throughput. Organizations with high network security requirements using MACsec offload hardware may experience operational disruptions if this issue is not addressed. Given the lack of known exploits, the immediate risk is moderate, but the potential for indirect impact on availability in critical infrastructure is notable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly update their Linux kernel to a version that includes the fix for CVE-2022-48720. Specifically, they should ensure that their kernel source or binary packages incorporate the patch that moves offload handling to macsec_common_dellink() for proper resource cleanup. Network administrators should audit their systems to identify usage of MACsec hardware offload features and monitor network device unregister events for abnormal resource consumption or performance degradation. In environments where immediate patching is not feasible, temporarily disabling MACsec hardware offload could reduce the risk of resource leaks, though this may impact network performance. Additionally, implementing robust monitoring and alerting on network device resource usage can help detect early signs of resource exhaustion. Coordination with hardware vendors to confirm compatibility with patched kernel versions is also recommended to avoid regressions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-20T11:09:39.051Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5f52
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 7:41:21 PM
Last updated: 8/16/2025, 12:58:45 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.