Skip to main content

CVE-2022-49671: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49671cvecve-2022-49671
Published: Wed Feb 26 2025 (02/26/2025, 02:24:04 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/cm: Fix memory leak in ib_cm_insert_listen cm_alloc_id_priv() allocates resource for the cm_id_priv. When cm_init_listen() fails it doesn't free it, leading to memory leak. Add the missing error unwind.

AI-Powered Analysis

AILast updated: 06/29/2025, 23:57:02 UTC

Technical Analysis

CVE-2022-49671 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) communication manager (cm) subsystem. Specifically, the flaw exists in the ib_cm_insert_listen function, where a memory leak occurs due to improper error handling. The function cm_alloc_id_priv() allocates resources for a cm_id_priv structure, which is essential for managing RDMA connection identifiers. However, if the subsequent function cm_init_listen() fails, the allocated resources are not freed, leading to a memory leak. This leak can cause the kernel to consume increasing amounts of memory over time, potentially degrading system performance or causing instability. The vulnerability arises from missing error unwind logic that should release allocated resources upon failure. Although this issue does not directly allow code execution or privilege escalation, the memory leak can be exploited in a denial-of-service (DoS) scenario by exhausting kernel memory, especially on systems heavily utilizing RDMA for high-performance networking. The vulnerability affects Linux kernel versions containing the specified commit hash and has been publicly disclosed and patched, but no known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, the impact of CVE-2022-49671 primarily concerns environments that rely on RDMA technology, such as data centers, high-performance computing clusters, and enterprises using advanced networking for storage or database acceleration. Memory leaks in the kernel can lead to gradual resource exhaustion, causing system slowdowns, crashes, or forced reboots, which disrupt critical services. Organizations in sectors like finance, research, telecommunications, and cloud service providers that deploy Linux servers with RDMA capabilities may experience operational interruptions if this vulnerability is exploited or left unpatched. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact can be significant, especially in production environments requiring high uptime. The lack of known exploits reduces immediate risk, but the potential for DoS attacks targeting kernel memory makes timely patching important to maintain service reliability.

Mitigation Recommendations

To mitigate CVE-2022-49671, organizations should promptly apply the official Linux kernel patches that address the memory leak in the RDMA cm subsystem. Since the vulnerability stems from missing error handling, updating to the latest kernel version containing the fix is the most effective measure. For environments where immediate patching is challenging, monitoring kernel memory usage and RDMA-related logs can help detect abnormal resource consumption indicative of exploitation attempts. Additionally, restricting access to RDMA interfaces to trusted users and systems reduces the attack surface. Network segmentation and applying strict access controls on RDMA-capable hosts can further limit exposure. Organizations should also ensure that their incident response plans include procedures for detecting and responding to kernel memory exhaustion events. Regular kernel updates and vulnerability scanning should be part of the security maintenance routine to prevent exploitation of similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.437Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe47c6

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/29/2025, 11:57:02 PM

Last updated: 8/11/2025, 9:19:19 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats