Skip to main content

CVE-2022-49650: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49650cvecve-2022-49650
Published: Wed Feb 26 2025 (02/26/2025, 02:23:53 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: bam_dma: fix runtime PM underflow Commit dbad41e7bb5f ("dmaengine: qcom: bam_dma: check if the runtime pm enabled") caused unbalanced pm_runtime_get/put() calls when the bam is controlled remotely. This commit reverts it and just enables pm_runtime in all cases, the clk_* functions already just nop when the clock is NULL. Also clean up a bit by removing unnecessary bamclk null checks.

AI-Powered Analysis

AILast updated: 06/29/2025, 23:54:42 UTC

Technical Analysis

CVE-2022-49650 is a vulnerability identified in the Linux kernel's dmaengine subsystem, specifically within the Qualcomm BAM DMA driver (bam_dma). The issue stems from a problematic commit (dbad41e7bb5f) that attempted to optimize runtime power management (PM) by conditionally enabling pm_runtime only when it was detected as enabled. This change inadvertently caused unbalanced pm_runtime_get and pm_runtime_put calls when the BAM hardware was controlled remotely, leading to potential underflow conditions in runtime PM reference counting. Such unbalanced calls can cause the device to enter an inconsistent power state, potentially leading to system instability or unexpected behavior. The fix involved reverting the conditional check and enabling pm_runtime unconditionally, relying on the fact that clock management functions (clk_*) are no-ops when the clock pointer is NULL, thus preventing the underflow. Additionally, the patch cleaned up unnecessary null checks related to bamclk. This vulnerability is specific to certain Linux kernel versions containing the problematic commit and affects systems using the Qualcomm BAM DMA controller. There are no known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, related to power management and device driver stability rather than direct code execution or privilege escalation.

Potential Impact

For European organizations, the impact of CVE-2022-49650 is primarily on the stability and reliability of Linux-based systems that utilize Qualcomm BAM DMA hardware, which is common in embedded devices, mobile platforms, and some IoT devices. While it does not directly enable remote code execution or privilege escalation, the unbalanced runtime PM calls could cause device malfunctions, unexpected shutdowns, or degraded performance. This can affect critical infrastructure relying on embedded Linux systems, such as telecommunications equipment, industrial control systems, and network appliances. Disruptions in these systems could lead to operational downtime, impacting service availability and potentially causing financial and reputational damage. However, since no active exploitation is known and the vulnerability relates to power management rather than direct security compromise, the immediate risk is moderate. Organizations with Linux systems running Qualcomm hardware should be aware of this issue, especially those deploying devices in sensitive or high-availability environments.

Mitigation Recommendations

To mitigate CVE-2022-49650, European organizations should: 1) Apply the official Linux kernel patches that revert the problematic commit and enable pm_runtime unconditionally for the Qualcomm BAM DMA driver. 2) Ensure that all embedded Linux devices and systems using Qualcomm BAM DMA hardware are updated to kernel versions containing the fix. 3) Conduct thorough testing of power management and device stability post-patching to confirm that runtime PM behavior is consistent and no regressions occur. 4) Monitor system logs and power management metrics for signs of unbalanced pm_runtime calls or device instability. 5) For devices that cannot be immediately patched, consider isolating them from critical networks or implementing additional monitoring to detect anomalies. 6) Collaborate with device vendors and Linux distribution maintainers to prioritize updates and communicate the importance of this fix. These steps go beyond generic advice by focusing on the specific driver and runtime PM behavior involved in this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.433Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4744

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/29/2025, 11:54:42 PM

Last updated: 8/13/2025, 5:22:52 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats