Skip to main content

CVE-2022-49153: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49153cvecve-2022-49153
Published: Wed Feb 26 2025 (02/26/2025, 01:55:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wireguard: socket: free skb in send6 when ipv6 is disabled I got a memory leak report: unreferenced object 0xffff8881191fc040 (size 232): comm "kworker/u17:0", pid 23193, jiffies 4295238848 (age 3464.870s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff814c3ef4>] slab_post_alloc_hook+0x84/0x3b0 [<ffffffff814c8977>] kmem_cache_alloc_node+0x167/0x340 [<ffffffff832974fb>] __alloc_skb+0x1db/0x200 [<ffffffff82612b5d>] wg_socket_send_buffer_to_peer+0x3d/0xc0 [<ffffffff8260e94a>] wg_packet_send_handshake_initiation+0xfa/0x110 [<ffffffff8260ec81>] wg_packet_handshake_send_worker+0x21/0x30 [<ffffffff8119c558>] process_one_work+0x2e8/0x770 [<ffffffff8119ca2a>] worker_thread+0x4a/0x4b0 [<ffffffff811a88e0>] kthread+0x120/0x160 [<ffffffff8100242f>] ret_from_fork+0x1f/0x30 In function wg_socket_send_buffer_as_reply_to_skb() or wg_socket_send_ buffer_to_peer(), the semantics of send6() is required to free skb. But when CONFIG_IPV6 is disable, kfree_skb() is missing. This patch adds it to fix this bug.

AI-Powered Analysis

AILast updated: 06/30/2025, 03:27:18 UTC

Technical Analysis

CVE-2022-49153 is a vulnerability identified in the Linux kernel's WireGuard implementation, specifically related to socket handling when IPv6 support is disabled (CONFIG_IPV6 disabled). WireGuard is a widely used VPN protocol integrated into the Linux kernel for secure network tunneling. The vulnerability arises from improper memory management in the functions wg_socket_send_buffer_as_reply_to_skb() and wg_socket_send_buffer_to_peer(). These functions rely on the semantics of the send6() function to free socket buffers (skb). However, when IPv6 is disabled, the expected call to kfree_skb() (which frees the socket buffer) is missing. This omission leads to a memory leak, as socket buffers are allocated but not freed properly. The memory leak was reported with evidence from kernel worker threads (kworker) showing unreferenced objects in memory, indicating that allocated memory was not reclaimed. The root cause is a missing call to kfree_skb() in the code path when IPv6 is disabled, which was addressed by a patch that adds this missing call to prevent the leak. This vulnerability affects specific Linux kernel versions identified by the commit hash e7096c131e5161fa3b8e52a650d7719d2857adfd. Although no known exploits are reported in the wild, the issue can degrade system performance or stability over time due to memory exhaustion, especially on systems running WireGuard with IPv6 disabled. Since WireGuard is often used in enterprise and cloud environments for secure communications, this vulnerability could impact network reliability and availability if left unpatched.

Potential Impact

For European organizations, the impact of CVE-2022-49153 primarily concerns the availability and stability of Linux-based systems running WireGuard VPN with IPv6 disabled. Memory leaks can cause gradual degradation of system performance, leading to potential service interruptions or crashes if memory exhaustion occurs. This is particularly critical for organizations relying on WireGuard for secure remote access, site-to-site VPNs, or cloud infrastructure connectivity. In sectors such as finance, healthcare, government, and critical infrastructure—where Linux servers and VPNs are prevalent—unaddressed memory leaks could disrupt business continuity and secure communications. Additionally, while this vulnerability does not directly lead to privilege escalation or data leakage, the resulting instability could be exploited as part of a broader attack chain or cause denial of service conditions. Given the increasing adoption of WireGuard in European enterprises and public sector networks, the vulnerability poses a tangible risk to operational reliability if not mitigated promptly.

Mitigation Recommendations

To mitigate CVE-2022-49153, European organizations should: 1) Apply the official Linux kernel patches that fix the missing kfree_skb() call in the WireGuard socket send functions. This is the definitive fix to prevent the memory leak. 2) If patching is not immediately possible, consider enabling IPv6 support temporarily if compatible with the environment, as the vulnerability manifests only when IPv6 is disabled. 3) Monitor system memory usage on Linux hosts running WireGuard, especially those with IPv6 disabled, to detect abnormal memory growth indicative of leaks. 4) Employ kernel live patching solutions where available to apply fixes without rebooting critical systems. 5) Review WireGuard configurations and update to the latest stable kernel versions that include the fix. 6) Incorporate this vulnerability into vulnerability management and patching cycles, prioritizing systems critical for secure communications. 7) Conduct thorough testing after patch application to ensure no regressions in VPN functionality. These steps go beyond generic advice by focusing on configuration-dependent risk factors and operational monitoring specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.275Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5087

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 3:27:18 AM

Last updated: 8/17/2025, 5:46:22 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats