
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49229 affects the Linux kernel's PTP (Precision Time Protocol) clock subsystem. The vulnerability was discovered in the handling of virtual clocks when unregistering physical clocks. When unregistering a physical clock that has enabled virtual clocks, the system fails to properly unregister the associated virtual clocks, leading to a potential page fault and system crash (Kernel Git).
The vulnerability occurs in the PTP clock unregistration process. When a driver providing a PTP clock is unloaded while it has enabled virtual clocks, the system encounters a page fault at address ffffffffc04fc4d8. This results in an Oops error in the ptpvclockread function, which is called through the timer subsystem's call chain. The issue stems from improper cleanup of virtual clocks during physical clock unregistration (Kernel Git).
When triggered, this vulnerability causes a system crash (kernel oops) due to an invalid memory access. This can lead to system instability and potential denial of service conditions when unloading PTP clock drivers that have active virtual clocks (Kernel Git).
The issue has been fixed by adding proper virtual clock unregistration when unregistering the physical clock. The fix involves adding an unregistervclock function that properly cleans up virtual clocks using deviceforeachchild to iterate through and unregister all associated virtual clocks (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."