CVE-2022-49366: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix reference count leak in smb_check_perm_dacl() The issue happens in a specific path in smb_check_perm_dacl(). When "id" and "uid" have the same value, the function simply jumps out of the loop without decrementing the reference count of the object "posix_acls", which is increased by get_acl() earlier. This may result in memory leaks. Fix it by decreasing the reference count of "posix_acls" before jumping to label "check_access_bits".
AI Analysis
Technical Summary
CVE-2022-49366 is a vulnerability identified in the Linux kernel's implementation of the SMB server daemon (ksmbd). The issue arises in the smb_check_perm_dacl() function, which is responsible for checking permissions against discretionary access control lists (DACLs) in SMB shares. Specifically, when the 'id' and 'uid' parameters have the same value, the function prematurely exits a loop without decrementing the reference count of the 'posix_acls' object. This object’s reference count is incremented earlier by a call to get_acl(). Failure to decrement the reference count leads to a reference count leak, which in turn causes a memory leak within the kernel. Over time, such leaks can degrade system performance or cause instability. The fix involves ensuring that the reference count of 'posix_acls' is properly decremented before the function jumps to the label 'check_access_bits', thereby preventing the leak. This vulnerability does not appear to have any known exploits in the wild and does not have an assigned CVSS score. The affected versions are identified by specific commit hashes, indicating that this is a recent and specific patch to the Linux kernel source code. The vulnerability is a resource management flaw rather than a direct code execution or privilege escalation issue.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to system stability and resource exhaustion rather than direct compromise or data breach. Organizations running Linux servers with SMB shares enabled via ksmbd could experience gradual memory leaks leading to degraded performance or potential denial of service due to resource exhaustion. This could affect file sharing services, network-attached storage, or any SMB-dependent infrastructure. While the vulnerability does not directly expose confidentiality or integrity risks, the resulting instability could disrupt business operations, especially in environments with high SMB traffic or long uptime requirements. Since no known exploits exist, the immediate risk is low, but unpatched systems could be vulnerable to future exploitation or accidental system failures. European enterprises relying heavily on Linux-based SMB services, such as cloud providers, hosting companies, or large enterprises with mixed OS environments, should be aware of this issue.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches that address CVE-2022-49366 once they become available in their distribution’s repositories. Specifically, updating to a kernel version that includes the fix for the ksmbd reference count leak is essential. Administrators should audit their Linux servers to identify those running ksmbd or SMB services and verify kernel versions. In environments where immediate patching is not feasible, monitoring system memory usage and SMB service stability can help detect potential leaks early. Additionally, consider limiting SMB exposure to trusted networks and enforcing strict access controls to reduce attack surfaces. For critical systems, implementing kernel live patching solutions can minimize downtime during patch deployment. Finally, maintain regular backups and system monitoring to quickly respond to any service disruptions caused by resource exhaustion.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49366: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix reference count leak in smb_check_perm_dacl() The issue happens in a specific path in smb_check_perm_dacl(). When "id" and "uid" have the same value, the function simply jumps out of the loop without decrementing the reference count of the object "posix_acls", which is increased by get_acl() earlier. This may result in memory leaks. Fix it by decreasing the reference count of "posix_acls" before jumping to label "check_access_bits".
AI-Powered Analysis
Technical Analysis
CVE-2022-49366 is a vulnerability identified in the Linux kernel's implementation of the SMB server daemon (ksmbd). The issue arises in the smb_check_perm_dacl() function, which is responsible for checking permissions against discretionary access control lists (DACLs) in SMB shares. Specifically, when the 'id' and 'uid' parameters have the same value, the function prematurely exits a loop without decrementing the reference count of the 'posix_acls' object. This object’s reference count is incremented earlier by a call to get_acl(). Failure to decrement the reference count leads to a reference count leak, which in turn causes a memory leak within the kernel. Over time, such leaks can degrade system performance or cause instability. The fix involves ensuring that the reference count of 'posix_acls' is properly decremented before the function jumps to the label 'check_access_bits', thereby preventing the leak. This vulnerability does not appear to have any known exploits in the wild and does not have an assigned CVSS score. The affected versions are identified by specific commit hashes, indicating that this is a recent and specific patch to the Linux kernel source code. The vulnerability is a resource management flaw rather than a direct code execution or privilege escalation issue.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to system stability and resource exhaustion rather than direct compromise or data breach. Organizations running Linux servers with SMB shares enabled via ksmbd could experience gradual memory leaks leading to degraded performance or potential denial of service due to resource exhaustion. This could affect file sharing services, network-attached storage, or any SMB-dependent infrastructure. While the vulnerability does not directly expose confidentiality or integrity risks, the resulting instability could disrupt business operations, especially in environments with high SMB traffic or long uptime requirements. Since no known exploits exist, the immediate risk is low, but unpatched systems could be vulnerable to future exploitation or accidental system failures. European enterprises relying heavily on Linux-based SMB services, such as cloud providers, hosting companies, or large enterprises with mixed OS environments, should be aware of this issue.
Mitigation Recommendations
To mitigate this vulnerability, organizations should promptly apply the official Linux kernel patches that address CVE-2022-49366 once they become available in their distribution’s repositories. Specifically, updating to a kernel version that includes the fix for the ksmbd reference count leak is essential. Administrators should audit their Linux servers to identify those running ksmbd or SMB services and verify kernel versions. In environments where immediate patching is not feasible, monitoring system memory usage and SMB service stability can help detect potential leaks early. Additionally, consider limiting SMB exposure to trusted networks and enforcing strict access controls to reduce attack surfaces. For critical systems, implementing kernel live patching solutions can minimize downtime during patch deployment. Finally, maintain regular backups and system monitoring to quickly respond to any service disruptions caused by resource exhaustion.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.555Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe57db
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:27:34 AM
Last updated: 1/18/2026, 12:43:49 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1119: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-1118: SQL Injection in itsourcecode Society Management System
MediumCVE-2025-15537: Heap-based Buffer Overflow in Mapnik
MediumCVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumWireshark 4.6.3 Released, (Sat, Jan 17th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.