CVE-2022-49012: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: afs: Fix server->active leak in afs_put_server The atomic_read was accidentally replaced with atomic_inc_return, which prevents the server from getting cleaned up and causes rmmod to hang with a warning: Can't purge s=00000001
AI Analysis
Technical Summary
CVE-2022-49012 is a vulnerability identified in the Linux kernel specifically related to the AFS (Andrew File System) server component. The issue arises from an incorrect atomic operation used in the afs_put_server function. Originally, the code used atomic_read to check the server's active reference count, but this was mistakenly replaced with atomic_inc_return, an atomic increment operation. This change prevents the server from being properly cleaned up, leading to a resource leak where the server's active reference count never reaches zero. Consequently, attempts to remove the AFS kernel module using rmmod hang indefinitely and produce a warning message: "Can't purge s=00000001". This indicates that the module cannot be unloaded because the server is still considered active. The vulnerability does not appear to allow direct remote code execution or privilege escalation but affects the kernel's ability to manage resources correctly, potentially causing denial of service (DoS) conditions by preventing module unloading and resource cleanup. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected versions are identified by specific git commit hashes, indicating the vulnerability is present in certain Linux kernel builds prior to the fix. The issue was reserved in August 2024 and published in October 2024, with the fix involving restoring the correct atomic_read operation to allow proper server cleanup.
Potential Impact
For European organizations, the impact of CVE-2022-49012 primarily revolves around system stability and maintainability rather than direct compromise. Organizations running Linux kernels with the vulnerable AFS implementation may experience difficulties unloading the AFS kernel module, leading to potential resource leaks and system hangs during module removal operations. This can affect system administrators' ability to update or patch kernel modules dynamically, possibly requiring system reboots to recover, which impacts availability and operational continuity. Although the vulnerability does not directly expose confidentiality or integrity risks, the denial of service aspect can disrupt critical services relying on AFS or kernel module management. Enterprises with infrastructure dependent on AFS for distributed file systems, such as research institutions, universities, or organizations with legacy systems, may be more affected. The inability to unload modules cleanly could complicate kernel maintenance and patch management, increasing operational risk and downtime. However, since no known exploits exist and the issue requires specific kernel module operations, the threat is moderate in scope but should be addressed promptly to avoid operational disruptions.
Mitigation Recommendations
To mitigate CVE-2022-49012, European organizations should: 1) Apply the official Linux kernel patches that restore the correct atomic_read operation in the afs_put_server function as soon as they are available from trusted sources or Linux distribution vendors. 2) Avoid unloading the AFS kernel module (rmmod) on affected kernel versions until patched, to prevent hangs and resource leaks. 3) Monitor kernel logs for the warning message "Can't purge s=00000001" as an indicator of this issue. 4) For environments where AFS is not used, consider disabling or removing the AFS kernel module to reduce attack surface and avoid this vulnerability altogether. 5) Incorporate kernel module management into routine maintenance windows to minimize impact if reboots are required. 6) Engage with Linux distribution security advisories and subscribe to relevant mailing lists to receive timely updates on patches and workarounds. 7) Test kernel updates in staging environments to ensure compatibility and stability before deployment in production. These steps go beyond generic advice by focusing on operational practices around kernel module management and monitoring specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2022-49012: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: afs: Fix server->active leak in afs_put_server The atomic_read was accidentally replaced with atomic_inc_return, which prevents the server from getting cleaned up and causes rmmod to hang with a warning: Can't purge s=00000001
AI-Powered Analysis
Technical Analysis
CVE-2022-49012 is a vulnerability identified in the Linux kernel specifically related to the AFS (Andrew File System) server component. The issue arises from an incorrect atomic operation used in the afs_put_server function. Originally, the code used atomic_read to check the server's active reference count, but this was mistakenly replaced with atomic_inc_return, an atomic increment operation. This change prevents the server from being properly cleaned up, leading to a resource leak where the server's active reference count never reaches zero. Consequently, attempts to remove the AFS kernel module using rmmod hang indefinitely and produce a warning message: "Can't purge s=00000001". This indicates that the module cannot be unloaded because the server is still considered active. The vulnerability does not appear to allow direct remote code execution or privilege escalation but affects the kernel's ability to manage resources correctly, potentially causing denial of service (DoS) conditions by preventing module unloading and resource cleanup. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The affected versions are identified by specific git commit hashes, indicating the vulnerability is present in certain Linux kernel builds prior to the fix. The issue was reserved in August 2024 and published in October 2024, with the fix involving restoring the correct atomic_read operation to allow proper server cleanup.
Potential Impact
For European organizations, the impact of CVE-2022-49012 primarily revolves around system stability and maintainability rather than direct compromise. Organizations running Linux kernels with the vulnerable AFS implementation may experience difficulties unloading the AFS kernel module, leading to potential resource leaks and system hangs during module removal operations. This can affect system administrators' ability to update or patch kernel modules dynamically, possibly requiring system reboots to recover, which impacts availability and operational continuity. Although the vulnerability does not directly expose confidentiality or integrity risks, the denial of service aspect can disrupt critical services relying on AFS or kernel module management. Enterprises with infrastructure dependent on AFS for distributed file systems, such as research institutions, universities, or organizations with legacy systems, may be more affected. The inability to unload modules cleanly could complicate kernel maintenance and patch management, increasing operational risk and downtime. However, since no known exploits exist and the issue requires specific kernel module operations, the threat is moderate in scope but should be addressed promptly to avoid operational disruptions.
Mitigation Recommendations
To mitigate CVE-2022-49012, European organizations should: 1) Apply the official Linux kernel patches that restore the correct atomic_read operation in the afs_put_server function as soon as they are available from trusted sources or Linux distribution vendors. 2) Avoid unloading the AFS kernel module (rmmod) on affected kernel versions until patched, to prevent hangs and resource leaks. 3) Monitor kernel logs for the warning message "Can't purge s=00000001" as an indicator of this issue. 4) For environments where AFS is not used, consider disabling or removing the AFS kernel module to reduce attack surface and avoid this vulnerability altogether. 5) Incorporate kernel module management into routine maintenance windows to minimize impact if reboots are required. 6) Engage with Linux distribution security advisories and subscribe to relevant mailing lists to receive timely updates on patches and workarounds. 7) Test kernel updates in staging environments to ensure compatibility and stability before deployment in production. These steps go beyond generic advice by focusing on operational practices around kernel module management and monitoring specific to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.644Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe68fd
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 1:11:11 AM
Last updated: 8/12/2025, 2:10:37 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.