CVE-2022-49389: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: usb: usbip: fix a refcount leak in stub_probe() usb_get_dev() is called in stub_device_alloc(). When stub_probe() fails after that, usb_put_dev() needs to be called to release the reference. Fix this by moving usb_put_dev() to sdev_free error path handling. Find this by code review.
AI Analysis
Technical Summary
CVE-2022-49389 is a vulnerability identified in the Linux kernel's USB/IP subsystem, specifically related to a reference count leak in the stub_probe() function. The USB/IP subsystem allows USB devices to be shared over IP networks, enabling remote access to USB devices. The vulnerability arises because the function stub_device_alloc() calls usb_get_dev() to increment the reference count of a USB device structure. However, if stub_probe() subsequently fails, the corresponding usb_put_dev() call, which decrements the reference count and releases the device, is not executed properly. This leads to a reference count leak, meaning the device reference is never released. The fix involves moving the usb_put_dev() call into the sdev_free error path handling to ensure that the reference count is correctly decremented even when stub_probe() fails. This vulnerability was discovered through code review rather than active exploitation. The affected Linux kernel versions include multiple commits identified by their hashes, indicating that the issue spans several versions of the kernel source code. No CVSS score has been assigned yet, and there are no known exploits in the wild. The vulnerability does not appear to directly allow code execution or privilege escalation but can lead to resource leaks within the kernel's USB/IP subsystem, potentially causing degraded system stability or denial of service over time if exploited or triggered repeatedly.
Potential Impact
For European organizations, the impact of CVE-2022-49389 is primarily related to system stability and availability. Organizations that rely on Linux servers or workstations utilizing the USB/IP subsystem for remote USB device sharing could experience resource leaks that degrade system performance or cause kernel instability. This could affect critical infrastructure, development environments, or operational technology systems that depend on Linux. While the vulnerability does not directly expose confidentiality or integrity risks, the resulting denial of service or system crashes could disrupt business operations, especially in environments where USB/IP is heavily used for remote device access. Given the widespread use of Linux across European industries, including telecommunications, manufacturing, and research institutions, the vulnerability could have a moderate operational impact if left unpatched. However, since exploitation requires triggering stub_probe() failures and no known exploits exist, the immediate risk is limited but should not be ignored.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions where this vulnerability is patched. Specifically, applying the latest stable kernel releases that include the fix for the USB/IP reference count leak is essential. For environments where kernel upgrades are challenging, organizations should audit their use of the USB/IP subsystem and consider disabling it if not required, thereby reducing the attack surface. Monitoring kernel logs for repeated stub_probe() failures or unusual USB/IP subsystem behavior can help detect attempts to trigger the vulnerability. Additionally, implementing strict access controls and network segmentation for systems using USB/IP can limit exposure. Organizations should also ensure robust backup and recovery procedures are in place to mitigate potential disruptions caused by kernel instability. Finally, staying informed through Linux kernel security advisories and promptly applying patches will reduce the window of vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49389: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: usb: usbip: fix a refcount leak in stub_probe() usb_get_dev() is called in stub_device_alloc(). When stub_probe() fails after that, usb_put_dev() needs to be called to release the reference. Fix this by moving usb_put_dev() to sdev_free error path handling. Find this by code review.
AI-Powered Analysis
Technical Analysis
CVE-2022-49389 is a vulnerability identified in the Linux kernel's USB/IP subsystem, specifically related to a reference count leak in the stub_probe() function. The USB/IP subsystem allows USB devices to be shared over IP networks, enabling remote access to USB devices. The vulnerability arises because the function stub_device_alloc() calls usb_get_dev() to increment the reference count of a USB device structure. However, if stub_probe() subsequently fails, the corresponding usb_put_dev() call, which decrements the reference count and releases the device, is not executed properly. This leads to a reference count leak, meaning the device reference is never released. The fix involves moving the usb_put_dev() call into the sdev_free error path handling to ensure that the reference count is correctly decremented even when stub_probe() fails. This vulnerability was discovered through code review rather than active exploitation. The affected Linux kernel versions include multiple commits identified by their hashes, indicating that the issue spans several versions of the kernel source code. No CVSS score has been assigned yet, and there are no known exploits in the wild. The vulnerability does not appear to directly allow code execution or privilege escalation but can lead to resource leaks within the kernel's USB/IP subsystem, potentially causing degraded system stability or denial of service over time if exploited or triggered repeatedly.
Potential Impact
For European organizations, the impact of CVE-2022-49389 is primarily related to system stability and availability. Organizations that rely on Linux servers or workstations utilizing the USB/IP subsystem for remote USB device sharing could experience resource leaks that degrade system performance or cause kernel instability. This could affect critical infrastructure, development environments, or operational technology systems that depend on Linux. While the vulnerability does not directly expose confidentiality or integrity risks, the resulting denial of service or system crashes could disrupt business operations, especially in environments where USB/IP is heavily used for remote device access. Given the widespread use of Linux across European industries, including telecommunications, manufacturing, and research institutions, the vulnerability could have a moderate operational impact if left unpatched. However, since exploitation requires triggering stub_probe() failures and no known exploits exist, the immediate risk is limited but should not be ignored.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to versions where this vulnerability is patched. Specifically, applying the latest stable kernel releases that include the fix for the USB/IP reference count leak is essential. For environments where kernel upgrades are challenging, organizations should audit their use of the USB/IP subsystem and consider disabling it if not required, thereby reducing the attack surface. Monitoring kernel logs for repeated stub_probe() failures or unusual USB/IP subsystem behavior can help detect attempts to trigger the vulnerability. Additionally, implementing strict access controls and network segmentation for systems using USB/IP can limit exposure. Organizations should also ensure robust backup and recovery procedures are in place to mitigate potential disruptions caused by kernel instability. Finally, staying informed through Linux kernel security advisories and promptly applying patches will reduce the window of vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.561Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9820c4522896dcbdd660
Added to database: 5/21/2025, 9:08:48 AM
Last enriched: 6/28/2025, 12:40:04 AM
Last updated: 8/3/2025, 7:00:57 PM
Views: 15
Related Threats
CVE-2025-45146: n/a
UnknownCVE-2025-38213
LowCVE-2025-8859: Unrestricted Upload in code-projects eBlog Site
MediumCVE-2025-8865: CWE-476 NULL Pointer Dereference in YugabyteDB Inc YugabyteDB
MediumCVE-2025-8852: Information Exposure Through Error Message in WuKongOpenSource WukongCRM
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.