CVE-2022-48693: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs In brcmstb_pm_probe(), there are two kinds of leak bugs: (1) we need to add of_node_put() when for_each__matching_node() breaks (2) we need to add iounmap() for each iomap in fail path
AI Analysis
Technical Summary
CVE-2022-48693 is a vulnerability identified in the Linux kernel specifically within the Broadcom STB (brcmstb) power management (pm-arm) driver code. The issue involves resource management bugs in the brcmstb_pm_probe() function, where two types of leaks were found: a reference count leak and an __iomem leak. The first leak occurs because the function fails to call of_node_put() when the for_each__matching_node() loop breaks prematurely, leading to a reference count not being decremented properly. The second leak involves missing calls to iounmap() for each iomap in failure paths, resulting in memory regions mapped for I/O not being properly unmapped. These leaks can cause resource exhaustion over time, potentially leading to system instability or denial of service. The vulnerability does not appear to allow direct code execution or privilege escalation but can degrade system reliability. The affected versions are identified by specific Linux kernel commit hashes, indicating that this is a low-level kernel driver issue. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was published on May 3, 2024, and has been addressed by patches that fix the resource management errors by adding the missing of_node_put() and iounmap() calls in the appropriate failure paths.
Potential Impact
For European organizations, the impact of CVE-2022-48693 primarily concerns systems running Linux kernels with the affected Broadcom STB power management driver, which is typically found in embedded devices such as set-top boxes, media players, or specialized hardware using Broadcom SoCs. While the vulnerability does not directly lead to remote code execution or privilege escalation, the resource leaks can cause gradual degradation of system stability, potentially leading to denial of service conditions. This can disrupt critical services relying on such embedded Linux devices, including telecommunications infrastructure, digital media distribution, and IoT deployments. Organizations in sectors like media broadcasting, telecommunications, and industrial control systems that use affected hardware could experience service interruptions or increased maintenance overhead. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or operational failures. Given the kernel-level nature of the bug, recovery may require system reboots or hardware resets, impacting availability.
Mitigation Recommendations
To mitigate CVE-2022-48693, European organizations should: 1) Identify devices and systems running Linux kernels with the affected brcmstb power management driver, focusing on embedded devices using Broadcom SoCs. 2) Apply the official Linux kernel patches that fix the resource leaks by ensuring proper calls to of_node_put() and iounmap() in the brcmstb_pm_probe() function. 3) Where patching is not immediately feasible, implement monitoring for unusual resource consumption or system instability on affected devices to detect potential leak-induced degradation early. 4) Schedule regular maintenance windows to reboot affected devices to clear leaked resources and maintain operational stability. 5) Engage with hardware vendors to obtain updated firmware or kernel versions incorporating the fix. 6) Incorporate this vulnerability into vulnerability management and asset inventory processes to track remediation status. 7) Avoid deploying untrusted code or configurations that could exacerbate resource consumption on affected devices. These steps go beyond generic advice by focusing on embedded device identification, vendor coordination, and operational monitoring specific to this kernel driver issue.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2022-48693: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs In brcmstb_pm_probe(), there are two kinds of leak bugs: (1) we need to add of_node_put() when for_each__matching_node() breaks (2) we need to add iounmap() for each iomap in fail path
AI-Powered Analysis
Technical Analysis
CVE-2022-48693 is a vulnerability identified in the Linux kernel specifically within the Broadcom STB (brcmstb) power management (pm-arm) driver code. The issue involves resource management bugs in the brcmstb_pm_probe() function, where two types of leaks were found: a reference count leak and an __iomem leak. The first leak occurs because the function fails to call of_node_put() when the for_each__matching_node() loop breaks prematurely, leading to a reference count not being decremented properly. The second leak involves missing calls to iounmap() for each iomap in failure paths, resulting in memory regions mapped for I/O not being properly unmapped. These leaks can cause resource exhaustion over time, potentially leading to system instability or denial of service. The vulnerability does not appear to allow direct code execution or privilege escalation but can degrade system reliability. The affected versions are identified by specific Linux kernel commit hashes, indicating that this is a low-level kernel driver issue. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The issue was published on May 3, 2024, and has been addressed by patches that fix the resource management errors by adding the missing of_node_put() and iounmap() calls in the appropriate failure paths.
Potential Impact
For European organizations, the impact of CVE-2022-48693 primarily concerns systems running Linux kernels with the affected Broadcom STB power management driver, which is typically found in embedded devices such as set-top boxes, media players, or specialized hardware using Broadcom SoCs. While the vulnerability does not directly lead to remote code execution or privilege escalation, the resource leaks can cause gradual degradation of system stability, potentially leading to denial of service conditions. This can disrupt critical services relying on such embedded Linux devices, including telecommunications infrastructure, digital media distribution, and IoT deployments. Organizations in sectors like media broadcasting, telecommunications, and industrial control systems that use affected hardware could experience service interruptions or increased maintenance overhead. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or operational failures. Given the kernel-level nature of the bug, recovery may require system reboots or hardware resets, impacting availability.
Mitigation Recommendations
To mitigate CVE-2022-48693, European organizations should: 1) Identify devices and systems running Linux kernels with the affected brcmstb power management driver, focusing on embedded devices using Broadcom SoCs. 2) Apply the official Linux kernel patches that fix the resource leaks by ensuring proper calls to of_node_put() and iounmap() in the brcmstb_pm_probe() function. 3) Where patching is not immediately feasible, implement monitoring for unusual resource consumption or system instability on affected devices to detect potential leak-induced degradation early. 4) Schedule regular maintenance windows to reboot affected devices to clear leaked resources and maintain operational stability. 5) Engage with hardware vendors to obtain updated firmware or kernel versions incorporating the fix. 6) Incorporate this vulnerability into vulnerability management and asset inventory processes to track remediation status. 7) Avoid deploying untrusted code or configurations that could exacerbate resource consumption on affected devices. These steps go beyond generic advice by focusing on embedded device identification, vendor coordination, and operational monitoring specific to this kernel driver issue.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-03T14:55:07.145Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5ea1
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 6:58:15 PM
Last updated: 7/31/2025, 11:45:53 AM
Views: 13
Related Threats
CVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.