Skip to main content

CVE-2022-49866: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49866cvecve-2022-49866
Published: Thu May 01 2025 (05/01/2025, 14:10:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: wwan: mhi: fix memory leak in mhi_mbim_dellink MHI driver registers network device without setting the needs_free_netdev flag, and does NOT call free_netdev() when unregisters network device, which causes a memory leak. This patch sets needs_free_netdev to true when registers network device, which makes netdev subsystem call free_netdev() automatically after unregister_netdevice().

AI-Powered Analysis

AILast updated: 06/30/2025, 02:41:42 UTC

Technical Analysis

CVE-2022-49866 is a vulnerability identified in the Linux kernel specifically related to the MHI (Modem Host Interface) driver within the wwan (Wireless Wide Area Network) subsystem. The issue arises because the MHI driver registers a network device without setting the 'needs_free_netdev' flag to true. Consequently, when the network device is unregistered, the kernel does not automatically call 'free_netdev()' to release the allocated memory. This omission leads to a memory leak in the kernel space. The vulnerability was addressed by modifying the driver to set the 'needs_free_netdev' flag to true during network device registration, ensuring that the kernel's network device subsystem will automatically free the network device memory upon unregistration. This fix prevents the memory leak from occurring. While the vulnerability does not appear to be exploitable for code execution or privilege escalation, the memory leak could degrade system stability and performance over time, especially on systems that frequently register and unregister the affected network devices. The affected Linux kernel versions are identified by a specific commit hash, indicating that this issue is present in certain kernel builds prior to the patch. There are no known exploits in the wild targeting this vulnerability, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to system reliability and availability rather than direct compromise of confidentiality or integrity. Systems running Linux kernels with the vulnerable MHI driver, particularly those using wireless WAN modems managed via the MHI interface, could experience gradual memory consumption increases leading to potential system slowdowns, crashes, or reboots if the memory leak is triggered repeatedly. This can affect critical infrastructure, telecommunications equipment, embedded devices, and IoT systems that rely on Linux-based modems or network interfaces. In sectors such as telecommunications, manufacturing, and transportation, where embedded Linux devices are common, this could result in service interruptions or degraded performance. However, since exploitation does not require user interaction or elevated privileges beyond what is needed to register/unregister network devices, the risk of remote exploitation is low. The absence of known exploits and the nature of the flaw suggest a medium operational risk, mainly impacting availability and system stability rather than security breaches.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to a version that includes the patch fixing CVE-2022-49866. Specifically, kernel maintainers and system administrators should ensure that the MHI driver is updated to the fixed version where 'needs_free_netdev' is correctly set. For embedded and IoT devices that may not receive frequent kernel updates, organizations should work with device vendors to obtain patched firmware or kernel versions. Monitoring system memory usage on devices using the MHI driver can help detect abnormal memory growth indicative of the leak. Additionally, implementing automated kernel update mechanisms or using long-term support (LTS) kernel versions with backported fixes can reduce exposure. For critical systems, consider isolating or limiting the use of affected network interfaces until patches are applied. Finally, maintain robust system logging and alerting to detect potential stability issues that could be related to this memory leak.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.237Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4ea5

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 2:41:42 AM

Last updated: 7/25/2025, 2:06:18 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats