Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-49754: Vulnerability in Linux Linux

0
High
VulnerabilityCVE-2022-49754cvecve-2022-49754
Published: Thu Mar 27 2025 (03/27/2025, 16:43:02 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() Smatch Warning: net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy() 'mesh_tx->param' too small (48 vs 50) Analysis: 'mesh_tx->param' is array of size 48. This is the destination. u8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48. But in the caller 'mesh_send' we reject only when len > 50. len > (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50.

AI-Powered Analysis

AILast updated: 06/30/2025, 01:10:04 UTC

Technical Analysis

CVE-2022-49754 is a buffer overflow vulnerability identified in the Linux kernel's Bluetooth management subsystem, specifically within the mgmt_mesh_add() function. The vulnerability arises due to improper bounds checking when copying data into the 'mesh_tx->param' buffer. The buffer 'mesh_tx->param' is statically allocated with a size of 48 bytes, calculated as the size of the struct mgmt_cp_mesh_send plus an additional 29 bytes. However, the caller function 'mesh_send' only rejects input lengths greater than 50 bytes, allowing up to 50 bytes to be copied. This discrepancy between the buffer size (48 bytes) and the allowed input length (up to 50 bytes) leads to a potential buffer overflow when memcpy() copies more data than the buffer can safely hold. Buffer overflows in kernel code are critical because they can lead to memory corruption, potentially allowing an attacker to execute arbitrary code with kernel privileges, cause denial of service via kernel crashes, or escalate privileges. The vulnerability is located in the Bluetooth management utilities, which handle mesh networking commands. Although no known exploits are currently reported in the wild, the nature of the flaw and its location in the kernel Bluetooth stack make it a significant security concern. The flaw was identified through static analysis (Smatch) and has been publicly disclosed with a patch presumably available in the Linux kernel source. The affected versions are identified by specific commit hashes, indicating that the vulnerability exists in certain kernel versions prior to the patch. Since the CVSS score is not provided, severity must be assessed based on technical details.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on Linux-based systems with Bluetooth mesh networking capabilities. Many enterprises, industrial control systems, IoT deployments, and mobile devices in Europe run Linux kernels that may include the affected Bluetooth stack. Exploitation could allow attackers to execute arbitrary code at the kernel level, leading to complete system compromise, data theft, or persistent backdoors. This is particularly concerning for sectors such as manufacturing, healthcare, telecommunications, and critical infrastructure, where Linux-based embedded systems and Bluetooth mesh networks are common. Additionally, the vulnerability could be leveraged to disrupt availability by causing kernel panics or system crashes. Given the increasing adoption of Bluetooth mesh for smart building automation and industrial IoT in Europe, the attack surface is significant. Although exploitation requires local access to the Bluetooth interface, attackers could leverage proximity or compromised devices to launch attacks. The lack of known exploits in the wild suggests that immediate widespread attacks are unlikely, but the vulnerability remains a high-risk target for sophisticated threat actors.

Mitigation Recommendations

European organizations should prioritize applying the official Linux kernel patches that address CVE-2022-49754 as soon as they become available. In the interim, organizations can mitigate risk by disabling Bluetooth mesh networking features if not required, or by disabling Bluetooth entirely on critical systems where feasible. Network segmentation should be employed to isolate vulnerable devices and limit Bluetooth access to trusted users and devices only. Monitoring Bluetooth traffic for anomalous mesh management commands could help detect exploitation attempts. Additionally, organizations should ensure that endpoint security solutions are updated to detect potential kernel-level exploits and maintain robust logging to facilitate incident response. For embedded and IoT devices, vendors should be engaged to provide updated firmware incorporating the patch. Finally, organizations should conduct thorough asset inventories to identify Linux systems with vulnerable kernel versions and Bluetooth mesh capabilities to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-03-27T16:39:17.988Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4a6e

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 1:10:04 AM

Last updated: 10/16/2025, 10:00:37 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats