CVE-2022-49290
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49290 affects the Linux kernel's mac80211 subsystem, specifically related to mesh networking functionality. The vulnerability was introduced by a fix for a memory leak (commit 6a01afcf8468) but created a potential double-free condition when rejoining a mesh network. This issue was discovered and reported by Matthias Kretschmer (Kernel Git).

Technical details

The vulnerability occurs in the mesh networking code where a double free can happen during mesh network operations. The issue manifests when ieee80211leavemesh() frees sdata->u.mesh.ie, followed by ieee80211joinmesh() attempting to free the same memory through copymeshsetup(). This double-free condition is particularly reproducible when using wpa_supplicant with an encrypted mesh network and executing specific mesh leave/join commands (NVD, Red Hat).

Impact

The vulnerability can lead to memory corruption and potential kernel panics when exploited. The issue is particularly impactful in systems using encrypted mesh networking, though it can be avoided in certain configurations where ifmsh->ie is NULL (Kernel Git).

Mitigation and workarounds

The issue has been fixed by removing the kfree()ing of the mesh IE in the mesh join function and leaving it solely up to the mesh leave to free the mesh IE. The fix has been implemented in various kernel versions through backporting (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management