Skip to main content

CVE-2022-49857: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49857cvecve-2022-49857
Published: Thu May 01 2025 (05/01/2025, 14:10:10 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix memory leak in prestera_rxtx_switch_init() When prestera_sdma_switch_init() failed, the memory pointed to by sw->rxtx isn't released. Fix it. Only be compiled, not be tested.

AI-Powered Analysis

AILast updated: 06/30/2025, 02:40:17 UTC

Technical Analysis

CVE-2022-49857 is a vulnerability identified in the Linux kernel specifically within the Marvell Prestera network driver code. The issue arises in the function prestera_rxtx_switch_init(), where a memory leak occurs if the prestera_sdma_switch_init() function fails. In this failure scenario, the memory allocated and pointed to by sw->rxtx is not properly released, leading to a resource leak. This vulnerability is related to memory management within the network driver initialization process. Although the vulnerability does not directly lead to code execution or privilege escalation, the memory leak can degrade system stability and performance over time, especially on systems with heavy network traffic or frequent reinitialization of the Prestera switch driver. The fix involves ensuring that the allocated memory is properly freed when prestera_sdma_switch_init() fails. This vulnerability is present in certain Linux kernel versions identified by the commit hash 501ef3066c89d7f9045315e1be58749cf9e6814d. There are no known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability is purely a resource management flaw and does not require user interaction or authentication to manifest, but it is limited to systems running the affected Prestera network driver code, which is specific to Marvell hardware platforms.

Potential Impact

For European organizations, the impact of CVE-2022-49857 is primarily related to system reliability and availability. Organizations using Linux servers or network appliances with Marvell Prestera switches could experience gradual memory exhaustion leading to degraded network performance or potential service interruptions. This could affect data centers, telecommunications infrastructure, and enterprise networks relying on these devices. While the vulnerability does not directly compromise confidentiality or integrity, the resulting instability could indirectly impact business operations, especially in critical infrastructure sectors such as finance, healthcare, and telecommunications. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or denial-of-service conditions caused by resource depletion. European organizations with large-scale deployments of Linux-based network equipment incorporating Marvell Prestera switches should be particularly vigilant.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Identify and inventory all Linux systems and network devices running the affected Prestera driver versions. 2) Apply the official Linux kernel patches or updates that address CVE-2022-49857 as soon as they become available from trusted Linux distributions or vendors. 3) Monitor system logs and resource usage metrics for signs of memory leaks or unusual resource consumption related to network driver initialization. 4) Where possible, implement automated patch management processes to ensure timely deployment of kernel updates. 5) For critical infrastructure, consider network segmentation and redundancy to minimize the impact of potential service degradation. 6) Engage with hardware vendors to confirm support and firmware updates for affected Marvell Prestera devices. These steps go beyond generic advice by focusing on proactive identification, patching, and monitoring specific to the Prestera driver environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.235Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4e58

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 2:40:17 AM

Last updated: 7/29/2025, 7:32:13 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats