CVE-2022-49389
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49389 is a reference counting vulnerability discovered in the Linux kernel's USB/IP implementation. The issue specifically affects the stubprobe() function in the USB/IP driver where usbgetdev() is called in stubdevicealloc(), but when stubprobe() fails, the reference isn't properly released, leading to a reference count leak (Kernel Git).

Technical details

The vulnerability exists in the drivers/usb/usbip/stubdev.c file where a reference counting error occurs in the stubprobe() function. When the function fails after calling usbgetdev() in stubdevicealloc(), it fails to properly release the reference with usbputdev(). The fix involves moving the usbputdev() call to the sdev_free error path handling to ensure proper reference counting (Red Hat CVE). The vulnerability has been assigned a CVSS v3.1 base score of 5.5, indicating moderate severity (Red Hat CVE).

Impact

The reference counting bug could potentially lead to memory leaks in the Linux kernel's USB/IP subsystem. This type of vulnerability could result in resource exhaustion over time, potentially affecting system stability and performance (NVD).

Mitigation and workarounds

The issue has been fixed by moving the usbputdev() call to the sdev_free error path handling. The fix was implemented in the Linux kernel and backported to various stable kernel versions. Users should update their kernel to a patched version that includes the fix (Kernel Git).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management