CVE-2022-49665

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's ThinkPad ACPI driver. When the driver fails to properly free EFCH MMIO resources during cleanup, it causes a gradual memory consumption that could lead to system instability. This affects Linux systems running on Lenovo ThinkPad hardware with the vulnerable driver loaded.

💻 Affected Systems

Products:
  • Linux kernel with thinkpad_acpi driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions running on Lenovo ThinkPad hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Lenovo ThinkPad hardware where the thinkpad_acpi driver is loaded and using EFCH MMIO resources.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could cause kernel memory exhaustion, leading to system crashes, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

Gradual memory consumption over time causing system performance degradation, potential application failures, or system instability requiring reboots.

🟢

If Mitigated

Minimal impact with proper monitoring and regular system maintenance; memory leak would be detected and addressed before causing significant issues.

🌐 Internet-Facing: LOW - This is a local kernel driver vulnerability requiring local access or existing system compromise to trigger.
🏢 Internal Only: MEDIUM - Internal users with local access could potentially trigger the memory leak, but exploitation requires specific hardware and driver conditions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and specific conditions to trigger the resource cleanup path. No known weaponized exploits in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel with commits 3884bf75fa044c73e843d95dd71a424e80ebb095 and d2f33f0c3ad7b0d5262d9b986f1353265fad7a08

Vendor Advisory: https://git.kernel.org/stable/c/3884bf75fa044c73e843d95dd71a424e80ebb095

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load patched kernel.

🔧 Temporary Workarounds

Disable thinkpad_acpi module

linux

Prevent loading of the vulnerable driver if ThinkPad-specific features are not required

echo 'blacklist thinkpad_acpi' >> /etc/modprobe.d/blacklist.conf
update-initramfs -u
reboot

🧯 If You Can't Patch

  • Monitor system memory usage closely for unusual consumption patterns
  • Implement regular system reboots to clear accumulated memory leaks

🔍 How to Verify

Check if Vulnerable:

Check if thinkpad_acpi module is loaded: lsmod | grep thinkpad_acpi. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits: grep -q '3884bf75fa044c73e843d95dd71a424e80ebb095\|d2f33f0c3ad7b0d5262d9b986f1353265fad7a08' /proc/version

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • System memory exhaustion warnings in dmesg
  • High memory usage alerts

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("Out of memory" OR "oom-killer" OR "memory allocation failure")

🔗 References

📤 Share & Export