CVE-2022-49817

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's MHI (Mobile Host Interface) network driver. When network devices are unregistered, the driver fails to properly free allocated memory, causing gradual memory exhaustion. This affects systems using the MHI driver for cellular modem connectivity.

💻 Affected Systems

Products:
  • Linux kernel with MHI network driver enabled
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if MHI driver is compiled and loaded (typically for devices with cellular modems). Most desktop/server systems are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to complete system memory exhaustion, causing kernel panic, system crashes, or denial of service on affected devices.

🟠

Likely Case

Gradual memory depletion over time leading to performance degradation, application failures, or system instability requiring reboots.

🟢

If Mitigated

With proper memory monitoring and restart policies, impact is limited to occasional performance issues rather than complete system failure.

🌐 Internet-Facing: LOW - This requires local access to trigger the memory leak through network device operations.
🏢 Internal Only: MEDIUM - Internal users or processes with network device management privileges could trigger this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to trigger network device unregistration operations, typically requiring local access or specific driver interactions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 25a270343b0f, 88da008e5e2f, f7c125bd79f5

Vendor Advisory: https://git.kernel.org/stable/c/25a270343b0f16e1f6e65f541a15975a35e238ff

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable MHI driver

linux

Prevent loading of vulnerable MHI network driver module

echo 'blacklist mhi_net' >> /etc/modprobe.d/blacklist-mhi.conf
rmmod mhi_net

Monitor memory usage

linux

Implement aggressive memory monitoring and alerting for systems using MHI driver

# Configure monitoring tools like Nagios, Zabbix, or custom scripts to track memory usage

🧯 If You Can't Patch

  • Implement strict memory usage monitoring with automated alerts for abnormal consumption
  • Restrict access to network device management operations to prevent triggering the vulnerability

🔍 How to Verify

Check if Vulnerable:

Check if MHI driver is loaded: 'lsmod | grep mhi_net' and check kernel version against patched versions

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and test network device unregistration while monitoring memory usage

📡 Detection & Monitoring

Log Indicators:

  • Kernel oom-killer messages
  • System log entries showing memory exhaustion
  • MHI driver error messages

Network Indicators:

  • Unusual network device state changes in systems with cellular modems

SIEM Query:

source="kernel" AND ("out of memory" OR "oom-killer" OR "mhi_net")

🔗 References

📤 Share & Export