CVE-2022-49399
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49399 affects the Linux kernel's goldfish TTY driver. The vulnerability was discovered in the handling of TTY port destruction, where ports initialized through ttyportinit() were not properly destroyed in error paths and during device removal. This issue was first disclosed on February 26, 2025 (NVD).

Technical details

The vulnerability exists in the goldfish TTY driver where two specific code paths failed to properly clean up TTY ports: 1) In goldfishttyprobe() function, where ports initialized through ttyportinit() were not being destroyed in error paths, and 2) In goldfishttyremove() function, where qtty->port was not being destroyed, potentially leading to resource leaks. The fix involves adding proper calls to ttyportdestroy() in both locations (Kernel Commit).

Impact

The vulnerability could result in resource leaks in the Linux kernel when the goldfish TTY driver is used. This occurs specifically when the TTY device encounters errors during initialization or during device removal (NVD).

Mitigation and workarounds

The issue has been fixed by implementing proper TTY port destruction through the addition of ttyportdestroy() calls in the affected code paths. The fix has been backported to multiple kernel versions, with Ubuntu 18.04 LTS (bionic) receiving the fix in version 4.15.0-192.203, and several other distributions also implementing the patch (Ubuntu).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management