CVE-2022-49746: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init If the function sdma_load_context() fails, the sdma_desc will be freed, but the allocated desc->bd is forgot to be freed. We already met the sdma_load_context() failure case and the log as below: [ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready ... In this case, the desc->bd will not be freed without this change.
AI Analysis
Technical Summary
CVE-2022-49746 is a vulnerability identified in the Linux kernel's dmaengine subsystem, specifically within the imx-sdma driver. The issue arises in the function sdma_transfer_init, where a potential memory leak occurs if the sdma_load_context() function fails. In this failure scenario, while the sdma_desc structure is properly freed, the associated buffer descriptor (desc->bd) allocated during the process is not released, leading to a memory leak. This condition can be triggered by a timeout waiting for the DMA channel to be ready, as indicated by the log message '[ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready'. The memory leak could accumulate over time if the failure condition is repeatedly encountered, potentially degrading system performance or stability. The vulnerability has been addressed by ensuring that the allocated desc->bd is freed even when sdma_load_context() fails. The affected versions are specific Linux kernel commits identified by the hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. No known exploits in the wild have been reported, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to system stability and resource exhaustion rather than direct compromise of confidentiality or integrity. Systems running Linux kernels with the affected imx-sdma driver, particularly embedded or industrial devices using i.MX processors (common in IoT, automotive, and industrial control systems), could experience memory leaks leading to degraded performance or crashes under certain failure conditions. This could disrupt critical operations, especially in sectors relying on embedded Linux systems such as manufacturing, transportation, and telecommunications. While the vulnerability does not directly enable remote code execution or privilege escalation, prolonged exploitation through repeated triggering of the failure could cause denial of service conditions. The lack of known exploits reduces immediate risk, but the potential for operational disruption in critical infrastructure or industrial environments is notable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to versions that include the patch fixing CVE-2022-49746. For embedded systems or devices where kernel updates are controlled by vendors, organizations should coordinate with suppliers to obtain patched firmware or kernel updates. Monitoring system logs for repeated 'Timeout waiting for CH0 ready' messages can help identify attempts to trigger the failure condition. Implementing resource monitoring to detect abnormal memory usage patterns may provide early warning of exploitation attempts. Additionally, organizations should review and harden access controls to embedded devices running the affected kernel to prevent unauthorized triggering of the vulnerability. For critical systems, consider isolating affected devices within segmented networks to limit potential impact. Finally, maintaining an inventory of devices using the imx-sdma driver and their kernel versions will facilitate targeted patch management.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2022-49746: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init If the function sdma_load_context() fails, the sdma_desc will be freed, but the allocated desc->bd is forgot to be freed. We already met the sdma_load_context() failure case and the log as below: [ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready ... In this case, the desc->bd will not be freed without this change.
AI-Powered Analysis
Technical Analysis
CVE-2022-49746 is a vulnerability identified in the Linux kernel's dmaengine subsystem, specifically within the imx-sdma driver. The issue arises in the function sdma_transfer_init, where a potential memory leak occurs if the sdma_load_context() function fails. In this failure scenario, while the sdma_desc structure is properly freed, the associated buffer descriptor (desc->bd) allocated during the process is not released, leading to a memory leak. This condition can be triggered by a timeout waiting for the DMA channel to be ready, as indicated by the log message '[ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready'. The memory leak could accumulate over time if the failure condition is repeatedly encountered, potentially degrading system performance or stability. The vulnerability has been addressed by ensuring that the allocated desc->bd is freed even when sdma_load_context() fails. The affected versions are specific Linux kernel commits identified by the hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. No known exploits in the wild have been reported, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of this vulnerability is primarily related to system stability and resource exhaustion rather than direct compromise of confidentiality or integrity. Systems running Linux kernels with the affected imx-sdma driver, particularly embedded or industrial devices using i.MX processors (common in IoT, automotive, and industrial control systems), could experience memory leaks leading to degraded performance or crashes under certain failure conditions. This could disrupt critical operations, especially in sectors relying on embedded Linux systems such as manufacturing, transportation, and telecommunications. While the vulnerability does not directly enable remote code execution or privilege escalation, prolonged exploitation through repeated triggering of the failure could cause denial of service conditions. The lack of known exploits reduces immediate risk, but the potential for operational disruption in critical infrastructure or industrial environments is notable.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to versions that include the patch fixing CVE-2022-49746. For embedded systems or devices where kernel updates are controlled by vendors, organizations should coordinate with suppliers to obtain patched firmware or kernel updates. Monitoring system logs for repeated 'Timeout waiting for CH0 ready' messages can help identify attempts to trigger the failure condition. Implementing resource monitoring to detect abnormal memory usage patterns may provide early warning of exploitation attempts. Additionally, organizations should review and harden access controls to embedded devices running the affected kernel to prevent unauthorized triggering of the vulnerability. For critical systems, consider isolating affected devices within segmented networks to limit potential impact. Finally, maintaining an inventory of devices using the imx-sdma driver and their kernel versions will facilitate targeted patch management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-03-27T16:39:17.987Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4a28
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:56:43 AM
Last updated: 8/15/2025, 2:04:14 PM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.