Skip to main content

CVE-2022-49908: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49908cvecve-2022-49908
Published: Thu May 01 2025 (05/01/2025, 14:10:51 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix memory leak in vhci_write Syzkaller reports a memory leak as follows: ==================================== BUG: memory leak unreferenced object 0xffff88810d81ac00 (size 240): [...] hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff838733d9>] __alloc_skb+0x1f9/0x270 net/core/skbuff.c:418 [<ffffffff833f742f>] alloc_skb include/linux/skbuff.h:1257 [inline] [<ffffffff833f742f>] bt_skb_alloc include/net/bluetooth/bluetooth.h:469 [inline] [<ffffffff833f742f>] vhci_get_user drivers/bluetooth/hci_vhci.c:391 [inline] [<ffffffff833f742f>] vhci_write+0x5f/0x230 drivers/bluetooth/hci_vhci.c:511 [<ffffffff815e398d>] call_write_iter include/linux/fs.h:2192 [inline] [<ffffffff815e398d>] new_sync_write fs/read_write.c:491 [inline] [<ffffffff815e398d>] vfs_write+0x42d/0x540 fs/read_write.c:578 [<ffffffff815e3cdd>] ksys_write+0x9d/0x160 fs/read_write.c:631 [<ffffffff845e0645>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff845e0645>] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [<ffffffff84600087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd ==================================== HCI core will uses hci_rx_work() to process frame, which is queued to the hdev->rx_q tail in hci_recv_frame() by HCI driver. Yet the problem is that, HCI core may not free the skb after handling ACL data packets. To be more specific, when start fragment does not contain the L2CAP length, HCI core just copies skb into conn->rx_skb and finishes frame process in l2cap_recv_acldata(), without freeing the skb, which triggers the above memory leak. This patch solves it by releasing the relative skb, after processing the above case in l2cap_recv_acldata().

AI-Powered Analysis

AILast updated: 06/29/2025, 20:27:26 UTC

Technical Analysis

CVE-2022-49908 is a vulnerability identified in the Linux kernel's Bluetooth subsystem, specifically within the Logical Link Control and Adaptation Protocol (L2CAP) implementation. The issue is a memory leak occurring in the vhci_write function of the virtual HCI (Host Controller Interface) driver. The vulnerability was discovered through fuzzing with Syzkaller, which reported unreferenced memory objects indicating a leak. The root cause lies in the handling of ACL (Asynchronous Connection-Less) data packets by the HCI core. When processing fragmented L2CAP packets, if the initial fragment does not contain the L2CAP length field, the HCI core copies the socket buffer (skb) into the connection's receive buffer (conn->rx_skb) and completes processing without freeing the original skb, resulting in a memory leak. This leak occurs because the skb is not released after processing in the l2cap_recv_acldata() function. The patch for this vulnerability ensures that the skb is properly freed after handling this specific case, preventing the memory leak. The vulnerability affects Linux kernel versions identified by the commit hashes provided, and it is relevant to systems using Bluetooth functionality via the Linux kernel's virtual HCI driver. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, this vulnerability primarily impacts systems running vulnerable Linux kernel versions with Bluetooth enabled, especially those utilizing virtual HCI drivers or Bluetooth communication stacks. The memory leak could lead to gradual exhaustion of kernel memory resources, potentially causing system instability, degraded performance, or crashes over time. This is particularly critical for embedded systems, IoT devices, or industrial control systems relying on Linux with Bluetooth connectivity, which are common in sectors such as manufacturing, healthcare, and transportation. While the vulnerability does not directly allow code execution or privilege escalation, the denial of service resulting from resource exhaustion could disrupt critical services. Additionally, persistent memory leaks may increase the attack surface for further exploitation or facilitate lateral movement if combined with other vulnerabilities. The impact is more pronounced in environments with high Bluetooth traffic or where devices are expected to run continuously without frequent reboots, such as in telecommunications infrastructure or public transport systems.

Mitigation Recommendations

To mitigate this vulnerability, organizations should apply the official Linux kernel patches that address CVE-2022-49908 as soon as they become available from their Linux distribution vendors. For systems where immediate patching is not feasible, disabling Bluetooth functionality or the virtual HCI driver can reduce exposure. Monitoring system logs and kernel memory usage for unusual patterns or increases in memory consumption related to Bluetooth operations can help detect exploitation attempts or the effects of the leak. Network segmentation and limiting Bluetooth device pairing to trusted devices can reduce the risk of exploitation. For embedded or IoT devices, firmware updates incorporating the patched kernel should be prioritized. Additionally, organizations should implement robust update management processes to ensure timely deployment of kernel security patches and maintain an inventory of devices running vulnerable kernel versions to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-01T14:05:17.247Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe401a

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:27:26 PM

Last updated: 8/8/2025, 11:59:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats