CVE-2022-49549: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails In mce_threshold_create_device(), if threshold_create_bank() fails, the previously allocated threshold banks array @bp will be leaked because the call to mce_threshold_remove_device() will not free it. This happens because mce_threshold_remove_device() fetches the pointer through the threshold_banks per-CPU variable but bp is written there only after the bank creation is successful, and not before, when threshold_create_bank() fails. Add a helper which unwinds all the bank creation work previously done and pass into it the previously allocated threshold banks array for freeing. [ bp: Massage. ]
AI Analysis
Technical Summary
CVE-2022-49549 is a vulnerability identified in the Linux kernel specifically affecting the x86 architecture with AMD processors in the Machine Check Exception (MCE) subsystem. The issue arises in the function threshold_create_bank(), which is responsible for creating threshold banks used by the MCE mechanism to monitor hardware errors. When threshold_create_bank() fails, the previously allocated memory for the threshold banks array (referred to as 'bp') is leaked because the cleanup function mce_threshold_remove_device() does not free this memory. This occurs because mce_threshold_remove_device() retrieves the pointer to the threshold banks from a per-CPU variable (threshold_banks) that is only updated after successful bank creation. If the creation fails, the pointer remains unset, and the allocated memory is not freed, resulting in a memory leak. The fix involves adding a helper function that properly unwinds and frees all previously allocated threshold banks in the event of a failure during bank creation. This vulnerability is a resource management flaw leading to memory leaks in kernel space, which could degrade system stability over time or under repeated failure conditions. There is no indication that this vulnerability allows privilege escalation, code execution, or direct data corruption, but the leak could be exploited to cause denial of service by exhausting kernel memory resources. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux systems, especially those using AMD processors on x86 platforms, this vulnerability could lead to gradual degradation of system performance or stability due to kernel memory leaks. Servers and critical infrastructure running Linux kernels with this flaw may experience increased risk of denial-of-service conditions if the memory leak accumulates over time, potentially causing system crashes or reboots. This is particularly relevant for data centers, cloud providers, and enterprises with large-scale Linux deployments. While the vulnerability does not appear to allow direct compromise of confidentiality or integrity, availability could be impacted, which in turn could disrupt business operations, especially for organizations with high uptime requirements. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the leak under specific hardware error conditions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for CVE-2022-49549. Since this vulnerability is in the kernel's MCE subsystem, kernel updates from trusted Linux distributors (such as Debian, Ubuntu, Red Hat, SUSE) should be applied promptly. System administrators should verify the kernel version and apply vendor-provided patches or kernel updates as soon as they become available. Additionally, monitoring system logs for repeated MCE errors or abnormal kernel memory usage can help detect if the leak is being triggered. Organizations should also ensure robust hardware monitoring and error reporting to minimize the occurrence of MCE-related failures. For environments where immediate patching is not feasible, implementing kernel memory usage monitoring and automated alerts can help mitigate the risk of system instability. Finally, testing kernel updates in staging environments before production deployment is recommended to avoid unintended disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-49549: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails In mce_threshold_create_device(), if threshold_create_bank() fails, the previously allocated threshold banks array @bp will be leaked because the call to mce_threshold_remove_device() will not free it. This happens because mce_threshold_remove_device() fetches the pointer through the threshold_banks per-CPU variable but bp is written there only after the bank creation is successful, and not before, when threshold_create_bank() fails. Add a helper which unwinds all the bank creation work previously done and pass into it the previously allocated threshold banks array for freeing. [ bp: Massage. ]
AI-Powered Analysis
Technical Analysis
CVE-2022-49549 is a vulnerability identified in the Linux kernel specifically affecting the x86 architecture with AMD processors in the Machine Check Exception (MCE) subsystem. The issue arises in the function threshold_create_bank(), which is responsible for creating threshold banks used by the MCE mechanism to monitor hardware errors. When threshold_create_bank() fails, the previously allocated memory for the threshold banks array (referred to as 'bp') is leaked because the cleanup function mce_threshold_remove_device() does not free this memory. This occurs because mce_threshold_remove_device() retrieves the pointer to the threshold banks from a per-CPU variable (threshold_banks) that is only updated after successful bank creation. If the creation fails, the pointer remains unset, and the allocated memory is not freed, resulting in a memory leak. The fix involves adding a helper function that properly unwinds and frees all previously allocated threshold banks in the event of a failure during bank creation. This vulnerability is a resource management flaw leading to memory leaks in kernel space, which could degrade system stability over time or under repeated failure conditions. There is no indication that this vulnerability allows privilege escalation, code execution, or direct data corruption, but the leak could be exploited to cause denial of service by exhausting kernel memory resources. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux systems, especially those using AMD processors on x86 platforms, this vulnerability could lead to gradual degradation of system performance or stability due to kernel memory leaks. Servers and critical infrastructure running Linux kernels with this flaw may experience increased risk of denial-of-service conditions if the memory leak accumulates over time, potentially causing system crashes or reboots. This is particularly relevant for data centers, cloud providers, and enterprises with large-scale Linux deployments. While the vulnerability does not appear to allow direct compromise of confidentiality or integrity, availability could be impacted, which in turn could disrupt business operations, especially for organizations with high uptime requirements. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the leak under specific hardware error conditions.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for CVE-2022-49549. Since this vulnerability is in the kernel's MCE subsystem, kernel updates from trusted Linux distributors (such as Debian, Ubuntu, Red Hat, SUSE) should be applied promptly. System administrators should verify the kernel version and apply vendor-provided patches or kernel updates as soon as they become available. Additionally, monitoring system logs for repeated MCE errors or abnormal kernel memory usage can help detect if the leak is being triggered. Organizations should also ensure robust hardware monitoring and error reporting to minimize the occurrence of MCE-related failures. For environments where immediate patching is not feasible, implementing kernel memory usage monitoring and automated alerts can help mitigate the risk of system instability. Finally, testing kernel updates in staging environments before production deployment is recommended to avoid unintended disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.590Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe43ff
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 10:12:03 PM
Last updated: 8/16/2025, 5:50:02 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.