Skip to main content

CVE-2022-49263: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49263cvecve-2022-49263
Published: Wed Feb 26 2025 (02/26/2025, 01:56:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path This avoids leaking memory if brcmf_chip_get_raminfo fails. Note that the CLM blob is released in the device remove path.

AI-Powered Analysis

AILast updated: 06/30/2025, 04:57:13 UTC

Technical Analysis

CVE-2022-49263 is a vulnerability identified in the Linux kernel specifically within the brcmfmac driver, which handles Broadcom FullMAC wireless devices over PCIe interfaces. The issue arises in the error handling path of the brcmf_pcie_setup function, where firmware resources are not properly released if the function brcmf_chip_get_raminfo fails. This improper cleanup leads to a memory leak, as the allocated firmware memory is not freed. The vulnerability does not affect the normal device removal path, where the CLM (Country Locale Map) blob is correctly released. While a memory leak itself may not directly lead to remote code execution or privilege escalation, it can degrade system stability and availability over time, especially on systems with limited memory or those running continuously without reboot. The vulnerability is present in specific Linux kernel versions identified by the commit hash 82f93cf46d6007ffa003b2d4a2834563b6b84d21. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The fix involves ensuring that firmware resources are released properly in all error paths to prevent memory leakage. This vulnerability is relevant to systems using Broadcom FullMAC wireless devices with PCIe interfaces running affected Linux kernel versions.

Potential Impact

For European organizations, the impact of CVE-2022-49263 primarily concerns system reliability and availability rather than direct compromise of confidentiality or integrity. Organizations relying on Linux systems with Broadcom FullMAC PCIe wireless devices—common in laptops, embedded systems, and some network appliances—may experience gradual memory exhaustion if the error condition triggering the leak occurs frequently. This could lead to degraded performance, system instability, or crashes, potentially disrupting business operations. Critical infrastructure or industrial control systems using affected hardware and Linux kernels could face increased downtime risks. Although no direct exploitation for privilege escalation or remote code execution is known, persistent memory leaks can be leveraged in complex attack chains or cause denial-of-service conditions. European enterprises with large Linux deployments, especially in sectors like telecommunications, manufacturing, and government, should be aware of this vulnerability's potential to affect system uptime and reliability.

Mitigation Recommendations

To mitigate CVE-2022-49263, organizations should: 1) Apply the latest Linux kernel patches that address the brcmfmac driver memory leak, ensuring all error paths properly release firmware resources. 2) Monitor systems using Broadcom FullMAC PCIe wireless devices for unusual memory usage patterns or system instability that may indicate the leak is being triggered. 3) Where possible, update or replace affected hardware with devices that have updated firmware or drivers not susceptible to this issue. 4) Implement robust system monitoring and automated reboot policies for critical systems to mitigate the impact of potential memory leaks. 5) Engage with Linux distribution vendors to confirm that their kernel packages include the fix and deploy updates promptly. 6) For embedded or specialized systems where kernel updates are challenging, consider isolating affected devices or limiting their use until patches can be applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.296Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe549c

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 4:57:13 AM

Last updated: 8/4/2025, 10:42:06 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats