Skip to main content

CVE-2022-48720: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48720cvecve-2022-48720
Published: Thu Jun 20 2024 (06/20/2024, 11:13:12 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: macsec: Fix offload support for NETDEV_UNREGISTER event Current macsec netdev notify handler handles NETDEV_UNREGISTER event by releasing relevant SW resources only, this causes resources leak in case of macsec HW offload, as the underlay driver was not notified to clean it's macsec offload resources. Fix by calling the underlay driver to clean it's relevant resources by moving offload handling from macsec_dellink() to macsec_common_dellink() when handling NETDEV_UNREGISTER event.

AI-Powered Analysis

AILast updated: 06/30/2025, 19:41:21 UTC

Technical Analysis

CVE-2022-48720 is a vulnerability identified in the Linux kernel's MACsec (Media Access Control Security) implementation, specifically related to the handling of the NETDEV_UNREGISTER event. MACsec is a security protocol that provides secure communication on Ethernet links by encrypting and authenticating data at the MAC layer. The vulnerability arises because the current MACsec network device notification handler only releases software (SW) resources when a network device is unregistered (NETDEV_UNREGISTER event). However, it fails to notify the underlying hardware (HW) offload driver to clean up its MACsec offload resources. This leads to a resource leak in cases where MACsec hardware offloading is used. The root cause is that the offload handling was performed in the macsec_dellink() function, which does not cover the NETDEV_UNREGISTER event properly. The fix involves moving the offload handling to macsec_common_dellink(), ensuring that when a network device is unregistered, the underlying driver is correctly informed to release its hardware offload resources. This correction prevents resource leaks that could degrade system performance or stability over time. The affected Linux kernel versions are identified by specific commit hashes, indicating that this is a source-level vulnerability affecting certain kernel builds. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations relying on Linux systems with MACsec hardware offload capabilities, this vulnerability could lead to resource leaks in network devices when they are unregistered. Over time, such leaks may cause degraded network performance, increased latency, or even system instability, particularly in environments with frequent network device reconfigurations or dynamic network topologies such as data centers, telecom infrastructure, or cloud providers. Confidentiality and integrity of data are not directly compromised by this vulnerability, as it does not involve bypassing encryption or authentication mechanisms. However, availability could be impacted due to resource exhaustion leading to potential denial of service conditions or degraded network throughput. Organizations with high network security requirements using MACsec offload hardware may experience operational disruptions if this issue is not addressed. Given the lack of known exploits, the immediate risk is moderate, but the potential for indirect impact on availability in critical infrastructure is notable.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should promptly update their Linux kernel to a version that includes the fix for CVE-2022-48720. Specifically, they should ensure that their kernel source or binary packages incorporate the patch that moves offload handling to macsec_common_dellink() for proper resource cleanup. Network administrators should audit their systems to identify usage of MACsec hardware offload features and monitor network device unregister events for abnormal resource consumption or performance degradation. In environments where immediate patching is not feasible, temporarily disabling MACsec hardware offload could reduce the risk of resource leaks, though this may impact network performance. Additionally, implementing robust monitoring and alerting on network device resource usage can help detect early signs of resource exhaustion. Coordination with hardware vendors to confirm compatibility with patched kernel versions is also recommended to avoid regressions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-20T11:09:39.051Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5f52

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 7:41:21 PM

Last updated: 8/16/2025, 12:58:45 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats