{
  "threat_severity" : "Low",
  "public_date" : "2025-06-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: HID: hidraw: fix memory leak in hidraw_release()",
    "id" : "2373552",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2373552"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-401",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nHID: hidraw: fix memory leak in hidraw_release()\nFree the buffered reports before deleting the list entry.\nBUG: memory leak\nunreferenced object 0xffff88810e72f180 (size 32):\ncomm \"softirq\", pid 0, jiffies 4294945143 (age 16.080s)\nhex dump (first 32 bytes):\n64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............\n00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\nbacktrace:\n[<ffffffff814ac6c3>] kmemdup+0x23/0x50 mm/util.c:128\n[<ffffffff8357c1d2>] kmemdup include/linux/fortify-string.h:440 [inline]\n[<ffffffff8357c1d2>] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521\n[<ffffffff8356ddad>] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992\n[<ffffffff8356e41e>] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065\n[<ffffffff835f0d3f>] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284\n[<ffffffff82d3c7f9>] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670\n[<ffffffff82d3cc26>] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747\n[<ffffffff82ef1e14>] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988\n[<ffffffff812f50a8>] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474\n[<ffffffff812f5586>] expire_timers kernel/time/timer.c:1519 [inline]\n[<ffffffff812f5586>] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790\n[<ffffffff812f56e4>] __run_timers kernel/time/timer.c:1768 [inline]\n[<ffffffff812f56e4>] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803\n[<ffffffff848000e6>] __do_softirq+0xe6/0x2ea kernel/softirq.c:571\n[<ffffffff81246db0>] invoke_softirq kernel/softirq.c:445 [inline]\n[<ffffffff81246db0>] __irq_exit_rcu kernel/softirq.c:650 [inline]\n[<ffffffff81246db0>] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662\n[<ffffffff84574f02>] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106\n[<ffffffff84600c8b>] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649\n[<ffffffff8458a070>] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]\n[<ffffffff8458a070>] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]\n[<ffffffff8458a070>] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]\n[<ffffffff8458a070>] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554", "A flaw was found in the HID device support in the Linux kernel. A missing release of allocated memory will cause a memory leak, potentially impacting system performance and resulting in a denial of service." ],
  "statement" : "This issue has been fixed in Red Hat Enterprise Linux 9.2 via RHSA-2023:2458 [1].\n[1]. https://access.redhat.com/errata/RHSA-2023:2458",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2023-05-09T00:00:00Z",
    "advisory" : "RHSA-2023:2458",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-284.11.1.el9_2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-49981\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-49981\nhttps://lore.kernel.org/linux-cve-announce/2025061821-CVE-2022-49981-305f@gregkh/T" ],
  "name" : "CVE-2022-49981",
  "csaw" : false
}