CVE-2022-49855

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's WWAN (Wireless Wide Area Network) subsystem. When the ipc_pcie_read_bios_cfg function retrieves power state configuration from BIOS, it fails to free allocated ACPI objects, causing gradual memory exhaustion. This affects systems using the iosm WWAN driver with vulnerable kernel versions.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions with iosm WWAN driver before fixes in stable trees
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with iosm WWAN hardware/driver enabled; many servers and desktops may not be affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained exploitation could lead to kernel memory exhaustion, causing system instability, denial of service, or potential kernel crashes requiring system reboot.

🟠

Likely Case

Gradual memory consumption over time leading to performance degradation, particularly on systems with limited memory or frequent WWAN configuration checks.

🟢

If Mitigated

Minimal impact with proper monitoring and memory limits; system remains functional but may experience occasional performance issues.

🌐 Internet-Facing: LOW - This vulnerability requires local access or kernel-level compromise to trigger; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires local access or kernel privileges; could be leveraged as part of privilege escalation chain or denial of service attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires kernel-level access or ability to trigger the vulnerable function; memory leaks are typically not directly weaponizable but can enable other attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in stable kernel trees via commits: 13b1ea861e8a, 7560ceef4d28, d38a648d2d6c

Vendor Advisory: https://git.kernel.org/stable/c/13b1ea861e8aeb701bcfbfe436b943efa2d44029

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched release.

🔧 Temporary Workarounds

Disable iosm WWAN module

linux

Prevent loading of vulnerable driver if WWAN functionality not required

echo 'blacklist iosm' >> /etc/modprobe.d/blacklist-iosm.conf
rmmod iosm

🧯 If You Can't Patch

  • Monitor system memory usage and kernel logs for memory pressure indicators
  • Implement kernel memory limits and restart services if memory consumption exceeds thresholds

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if iosm module is loaded: 'uname -r' and 'lsmod | grep iosm'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is after fix commits and monitor for memory leaks using tools like 'vmstat', 'slabtop', or kernel memory monitoring

📡 Detection & Monitoring

Log Indicators:

  • Kernel OOM (Out of Memory) messages in /var/log/kern.log or dmesg
  • Increasing slab memory usage over time

Network Indicators:

  • None - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("out of memory" OR "slab allocation failure") AND process="iosm"

🔗 References

📤 Share & Export