Skip to main content

CVE-2022-49427: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49427cvecve-2022-49427
Published: Wed Feb 26 2025 (02/26/2025, 02:12:47 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: Remove clk_disable in mtk_iommu_remove After the commit b34ea31fe013 ("iommu/mediatek: Always enable the clk on resume"), the iommu clock is controlled by the runtime callback. thus remove the clk control in the mtk_iommu_remove. Otherwise, it will warning like: echo 14018000.iommu > /sys/bus/platform/drivers/mtk-iommu/unbind [ 51.413044] ------------[ cut here ]------------ [ 51.413648] vpp0_smi_iommu already disabled [ 51.414233] WARNING: CPU: 2 PID: 157 at */v5.15-rc1/kernel/mediatek/ drivers/clk/clk.c:952 clk_core_disable+0xb0/0xb8 [ 51.417174] Hardware name: MT8195V/C(ENG) (DT) [ 51.418635] pc : clk_core_disable+0xb0/0xb8 [ 51.419177] lr : clk_core_disable+0xb0/0xb8 ... [ 51.429375] Call trace: [ 51.429694] clk_core_disable+0xb0/0xb8 [ 51.430193] clk_core_disable_lock+0x24/0x40 [ 51.430745] clk_disable+0x20/0x30 [ 51.431189] mtk_iommu_remove+0x58/0x118 [ 51.431705] platform_remove+0x28/0x60 [ 51.432197] device_release_driver_internal+0x110/0x1f0 [ 51.432873] device_driver_detach+0x18/0x28 [ 51.433418] unbind_store+0xd4/0x108 [ 51.433886] drv_attr_store+0x24/0x38 [ 51.434363] sysfs_kf_write+0x40/0x58 [ 51.434843] kernfs_fop_write_iter+0x164/0x1e0

AI-Powered Analysis

AILast updated: 06/28/2025, 00:41:13 UTC

Technical Analysis

CVE-2022-49427 is a vulnerability identified in the Linux kernel specifically related to the MediaTek IOMMU (Input-Output Memory Management Unit) driver. The issue arises from improper clock management in the mtk_iommu_remove function. After a prior commit (b34ea31fe013) that changed the clock control to be managed by runtime callbacks during resume operations, the mtk_iommu_remove function still attempted to disable the clock manually by calling clk_disable. This redundant clock disable call leads to warnings and potential instability, as the clock may already be disabled when mtk_iommu_remove is invoked. The kernel logs indicate warnings such as "vpp0_smi_iommu already disabled" and stack traces involving clk_core_disable and mtk_iommu_remove, which suggest improper handling of clock states. While the vulnerability does not appear to be a direct code execution or privilege escalation flaw, the improper clock management can cause kernel warnings, potential race conditions, or resource mismanagement that may lead to system instability or denial of service. The vulnerability affects specific Linux kernel versions identified by certain commit hashes, including versions around 5.15-rc1 and others listed. No known exploits are reported in the wild, and no CVSS score has been assigned. The root cause is a synchronization and resource management bug in the MediaTek IOMMU driver related to clock control during device removal.

Potential Impact

For European organizations, the impact of CVE-2022-49427 is primarily related to system stability and reliability rather than direct compromise of confidentiality or integrity. Organizations using Linux systems with MediaTek SoCs (System on Chips) that include the affected IOMMU driver could experience kernel warnings, potential crashes, or denial of service conditions during device removal or power management operations. This could affect embedded systems, IoT devices, or specialized hardware running Linux kernels with the MediaTek IOMMU driver. In critical infrastructure or industrial control systems where uptime and reliability are paramount, such instability could disrupt operations. However, since there is no indication of privilege escalation or remote code execution, the risk of data breach or unauthorized access is low. The vulnerability could nonetheless increase operational risk and maintenance overhead, especially in environments with automated device management or frequent device hot-plugging/unplugging. European organizations relying on MediaTek-based Linux devices in telecommunications, manufacturing, or consumer electronics sectors should be aware of this issue.

Mitigation Recommendations

To mitigate CVE-2022-49427, organizations should: 1) Apply the official Linux kernel patches that remove the redundant clk_disable call in the mtk_iommu_remove function, ensuring clock management aligns with runtime PM callbacks. 2) Update Linux kernel versions to those including the fix, preferably from trusted distributions that backport security patches. 3) For embedded or IoT devices, coordinate with hardware vendors or device manufacturers to obtain firmware or kernel updates incorporating the fix. 4) Monitor kernel logs for warnings related to IOMMU clock disable operations to detect potential occurrences of the issue. 5) Implement robust testing and validation of device removal and power management workflows to identify instability early. 6) Where possible, limit device hot-unbinding or removal operations on affected systems until patches are applied. 7) Maintain an inventory of Linux systems using MediaTek SoCs to prioritize patching and risk assessment. These steps go beyond generic advice by focusing on vendor coordination, kernel version management, and operational monitoring specific to the MediaTek IOMMU context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.569Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9820c4522896dcbdd68f

Added to database: 5/21/2025, 9:08:48 AM

Last enriched: 6/28/2025, 12:41:13 AM

Last updated: 8/12/2025, 1:27:00 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats