
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49399 affects the Linux kernel's goldfish TTY driver. The vulnerability was discovered in the handling of TTY port destruction, where ports initialized through tty_port_init() were not properly destroyed in error paths and during device removal. This issue was first disclosed on February 26, 2025 (NVD).
The vulnerability exists in the goldfish TTY driver where two specific code paths failed to properly clean up TTY ports: 1) In goldfish_tty_probe() function, where ports initialized through tty_port_init() were not being destroyed in error paths, and 2) In goldfish_tty_remove() function, where qtty->port was not being destroyed, potentially leading to resource leaks. The fix involves adding proper calls to tty_port_destroy() in both locations (Kernel Commit).
The vulnerability could result in resource leaks in the Linux kernel when the goldfish TTY driver is used. This occurs specifically when the TTY device encounters errors during initialization or during device removal (NVD).
The issue has been fixed by implementing proper TTY port destruction through the addition of tty_port_destroy() calls in the affected code paths. The fix has been backported to multiple kernel versions, with Ubuntu 18.04 LTS (bionic) receiving the fix in version 4.15.0-192.203, and several other distributions also implementing the patch (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."