Skip to main content

CVE-2022-49121: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49121cvecve-2022-49121
Published: Wed Feb 26 2025 (02/26/2025, 01:55:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix tag leaks on error In pm8001_chip_set_dev_state_req(), pm8001_chip_fw_flash_update_req(), pm80xx_chip_phy_ctl_req() and pm8001_chip_reg_dev_req() add missing calls to pm8001_tag_free() to free the allocated tag when pm8001_mpi_build_cmd() fails. Similarly, in pm8001_exec_internal_task_abort(), if the chip ->task_abort method fails, the tag allocated for the abort request task must be freed. Add the missing call to pm8001_tag_free().

AI-Powered Analysis

AILast updated: 06/30/2025, 02:57:50 UTC

Technical Analysis

CVE-2022-49121 is a vulnerability identified in the Linux kernel's SCSI subsystem, specifically within the pm8001 driver which manages certain SAS (Serial Attached SCSI) controllers. The issue stems from improper resource management where allocated tags, used to track commands or tasks, are not freed correctly upon failure conditions in several functions: pm8001_chip_set_dev_state_req(), pm8001_chip_fw_flash_update_req(), pm80xx_chip_phy_ctl_req(), pm8001_chip_reg_dev_req(), and pm8001_exec_internal_task_abort(). These missing calls to pm8001_tag_free() lead to tag leaks, which can cause resource exhaustion over time. The vulnerability does not appear to be related to direct code execution or privilege escalation but rather to inefficient cleanup that could degrade system stability or availability. The flaw is fixed by adding the missing calls to free allocated tags when command building or task abort operations fail, preventing resource leaks. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The affected versions are identified by specific commit hashes, indicating this is a recent patch to the Linux kernel source code. This vulnerability is primarily a reliability and availability concern affecting Linux systems using the pm8001 driver for SAS controllers.

Potential Impact

For European organizations, the impact of CVE-2022-49121 is mainly related to system stability and availability rather than confidentiality or integrity. Organizations running Linux servers or storage systems with SAS controllers managed by the pm8001 driver could experience gradual resource exhaustion due to tag leaks, potentially leading to degraded performance or system crashes under heavy I/O workloads. This could affect data center operations, storage reliability, and service uptime, especially in environments with high storage throughput such as cloud providers, financial institutions, and research centers. Although the vulnerability does not directly enable remote code execution or privilege escalation, the resulting instability could be exploited indirectly by attackers to cause denial of service conditions. Given the widespread use of Linux in enterprise and cloud infrastructure across Europe, unpatched systems may face increased risk of operational disruption. However, the absence of known exploits and the technical nature of the flaw suggest that immediate risk is moderate but should not be ignored.

Mitigation Recommendations

European organizations should prioritize applying the Linux kernel patch that addresses CVE-2022-49121 as soon as it is available in their distribution's kernel updates. Specifically, ensure that Linux kernel versions include the fix for the pm8001 driver to prevent tag leaks. System administrators should audit their infrastructure to identify servers and storage devices using SAS controllers managed by the pm8001 driver. Monitoring tools should be configured to detect unusual resource consumption or system instability related to SCSI operations. For critical systems, consider implementing redundancy and failover mechanisms to mitigate potential availability impacts. Additionally, organizations should maintain up-to-date kernel versions and subscribe to Linux vendor security advisories to receive timely updates. Testing patches in staging environments before production deployment is recommended to ensure compatibility and stability. Finally, documenting and training relevant IT staff on this vulnerability will help maintain awareness and readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.264Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4f80

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 2:57:50 AM

Last updated: 7/26/2025, 8:14:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats