CVE-2022-49095: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() The error handling path of the probe releases a resource that is not freed in the remove function. In some cases, a ioremap() must be undone. Add the missing iounmap() call in the remove function.
AI Analysis
Technical Summary
CVE-2022-49095 is a vulnerability identified in the Linux kernel specifically within the SCSI subsystem driver for the zorro7xx hardware interface. The issue arises from a resource leak in the error handling path of the probe function, where a resource allocated by ioremap() is not properly released by a corresponding iounmap() call in the remove function. The zorro7xx_remove_one() function is responsible for cleaning up resources when a device is removed, but the missing iounmap() call means that memory-mapped I/O regions remain mapped, leading to resource leakage. This flaw does not directly allow code execution or privilege escalation but can cause system resource exhaustion over time, potentially degrading system stability or causing denial of service conditions. The vulnerability affects specific Linux kernel versions identified by the commit hash 45804fbb00eea27bdf4d62751681228a9e2844e9. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The fix involves adding the missing iounmap() call to properly unmap the I/O memory during device removal, ensuring resources are correctly freed and preventing leaks.
Potential Impact
For European organizations, the impact of CVE-2022-49095 is primarily related to system reliability and availability rather than direct compromise of confidentiality or integrity. Organizations running Linux systems with the affected kernel versions and utilizing hardware that relies on the zorro7xx SCSI driver could experience gradual resource leaks leading to degraded performance or system crashes. This could affect servers, embedded systems, or specialized industrial equipment. While the vulnerability does not enable remote code execution or privilege escalation, the resulting instability could disrupt critical services, especially in sectors relying on high availability such as finance, healthcare, manufacturing, and telecommunications. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or operational issues.
Mitigation Recommendations
European organizations should prioritize updating Linux kernels to versions that include the patch fixing CVE-2022-49095. Specifically, ensure that the kernel includes the corrected zorro7xx_remove_one() function with the added iounmap() call. For environments where immediate patching is not feasible, monitoring system logs and resource usage related to the zorro7xx driver can help detect abnormal resource consumption indicative of the leak. Organizations should also audit their hardware inventory to identify systems using the zorro7xx SCSI interface and assess their exposure. Implementing kernel live patching solutions where supported can reduce downtime during remediation. Additionally, maintaining robust backup and recovery procedures will mitigate potential availability impacts. Coordination with Linux distribution vendors for timely updates and security advisories is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland, Poland, Belgium
CVE-2022-49095: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() The error handling path of the probe releases a resource that is not freed in the remove function. In some cases, a ioremap() must be undone. Add the missing iounmap() call in the remove function.
AI-Powered Analysis
Technical Analysis
CVE-2022-49095 is a vulnerability identified in the Linux kernel specifically within the SCSI subsystem driver for the zorro7xx hardware interface. The issue arises from a resource leak in the error handling path of the probe function, where a resource allocated by ioremap() is not properly released by a corresponding iounmap() call in the remove function. The zorro7xx_remove_one() function is responsible for cleaning up resources when a device is removed, but the missing iounmap() call means that memory-mapped I/O regions remain mapped, leading to resource leakage. This flaw does not directly allow code execution or privilege escalation but can cause system resource exhaustion over time, potentially degrading system stability or causing denial of service conditions. The vulnerability affects specific Linux kernel versions identified by the commit hash 45804fbb00eea27bdf4d62751681228a9e2844e9. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The fix involves adding the missing iounmap() call to properly unmap the I/O memory during device removal, ensuring resources are correctly freed and preventing leaks.
Potential Impact
For European organizations, the impact of CVE-2022-49095 is primarily related to system reliability and availability rather than direct compromise of confidentiality or integrity. Organizations running Linux systems with the affected kernel versions and utilizing hardware that relies on the zorro7xx SCSI driver could experience gradual resource leaks leading to degraded performance or system crashes. This could affect servers, embedded systems, or specialized industrial equipment. While the vulnerability does not enable remote code execution or privilege escalation, the resulting instability could disrupt critical services, especially in sectors relying on high availability such as finance, healthcare, manufacturing, and telecommunications. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or operational issues.
Mitigation Recommendations
European organizations should prioritize updating Linux kernels to versions that include the patch fixing CVE-2022-49095. Specifically, ensure that the kernel includes the corrected zorro7xx_remove_one() function with the added iounmap() call. For environments where immediate patching is not feasible, monitoring system logs and resource usage related to the zorro7xx driver can help detect abnormal resource consumption indicative of the leak. Organizations should also audit their hardware inventory to identify systems using the zorro7xx SCSI interface and assess their exposure. Implementing kernel live patching solutions where supported can reduce downtime during remediation. Additionally, maintaining robust backup and recovery procedures will mitigate potential availability impacts. Coordination with Linux distribution vendors for timely updates and security advisories is recommended.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.249Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6b20
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 2:10:31 AM
Last updated: 1/7/2026, 6:07:39 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.