Skip to main content

CVE-2022-49397: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49397cvecve-2022-49397
Published: Wed Feb 26 2025 (02/26/2025, 02:11:26 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: phy: qcom-qmp: fix struct clk leak on probe errors Make sure to release the pipe clock reference in case of a late probe error (e.g. probe deferral).

AI-Powered Analysis

AILast updated: 06/30/2025, 06:43:23 UTC

Technical Analysis

CVE-2022-49397 is a vulnerability identified in the Linux kernel, specifically within the Qualcomm QMP (Qualcomm Multi-Protocol) PHY driver code. The issue relates to improper handling of clock references during the probe process of the driver. In particular, when a probe error occurs late in the initialization sequence—such as a probe deferral—the driver fails to release the pipe clock reference properly, resulting in a resource leak. This leak is due to the struct clk not being freed or released when the probe does not complete successfully. While this vulnerability does not directly lead to code execution or privilege escalation, it can cause resource exhaustion over time, potentially leading to degraded system performance or instability. The vulnerability affects specific Linux kernel versions identified by the commit hash e78f3d15e115e8e764d4b1562b4fa538f2e22f6b, and the fix involves ensuring that the pipe clock reference is released appropriately in all probe error scenarios. No known exploits are currently in the wild, and no CVSS score has been assigned yet. The vulnerability is primarily a resource management flaw within the kernel driver subsystem for Qualcomm hardware PHY components.

Potential Impact

For European organizations, the impact of CVE-2022-49397 is generally limited but not negligible. Organizations relying on Linux-based systems running Qualcomm hardware with the affected PHY driver could experience resource leaks leading to system instability or degraded performance, especially in embedded or network infrastructure devices. This may affect telecommunications providers, IoT device manufacturers, and enterprises using Qualcomm-based Linux systems. While it does not directly compromise confidentiality or integrity, availability could be impacted if the resource leak accumulates and causes system crashes or degraded throughput. This could disrupt critical services, particularly in sectors like telecommunications, manufacturing, or critical infrastructure where Qualcomm-based Linux devices are deployed. However, the lack of known exploits and the nature of the vulnerability suggest the risk of immediate widespread disruption is low. Organizations with robust patch management and monitoring should be able to mitigate impact effectively.

Mitigation Recommendations

To mitigate CVE-2022-49397, European organizations should: 1) Identify all Linux systems running Qualcomm QMP PHY drivers, particularly those using kernel versions corresponding to the affected commit. 2) Apply the official Linux kernel patches or updates that address this vulnerability as soon as they become available, ensuring the pipe clock references are properly released on probe errors. 3) Monitor system logs and kernel messages for signs of probe errors or clock reference leaks, which may indicate attempts to trigger the issue or system instability. 4) For embedded or network devices, coordinate with hardware vendors to obtain firmware or kernel updates incorporating the fix. 5) Implement resource monitoring on critical systems to detect abnormal resource consumption that could be related to this leak. 6) Maintain a robust update and patch management process to quickly deploy fixes when released. 7) Consider isolating or limiting exposure of vulnerable devices in sensitive environments until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.563Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe58d1

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:43:23 AM

Last updated: 7/30/2025, 11:17:03 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats