Skip to main content

CVE-2022-48859: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48859cvecve-2022-48859
Published: Tue Jul 16 2024 (07/16/2024, 12:25:23 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr This node pointer is returned by of_find_compatible_node() with refcount incremented. Calling of_node_put() to aovid the refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 22:54:57 UTC

Technical Analysis

CVE-2022-48859 is a vulnerability identified in the Linux kernel specifically within the Marvell Prestera network driver code. The issue stems from a missing call to of_node_put() in the function prestera_switch_set_base_mac_addr. The function of_find_compatible_node() returns a device tree node pointer with its reference count incremented to manage the lifecycle of the node object properly. However, the absence of a corresponding of_node_put() call leads to a reference count leak, which means the reference count is never decremented as it should be. Over time, this can cause resource leakage in the kernel, potentially leading to increased memory consumption and instability in the network driver subsystem. This vulnerability is a resource management flaw rather than a direct memory corruption or code execution issue. It affects specific versions of the Linux kernel that include the Marvell Prestera driver implementation with the described flaw. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was published on July 16, 2024, and is classified as a kernel-level bug affecting network driver code, which is critical infrastructure in many Linux-based systems. The technical root cause is a missing decrement of the reference count on a device tree node, which is a common pattern in Linux kernel device management to prevent premature freeing of resources. The fix involves adding the missing of_node_put() call to ensure proper reference counting and resource cleanup.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to system stability and reliability rather than direct compromise of confidentiality or integrity. Systems running Linux kernels with the affected Marvell Prestera driver may experience resource leaks that degrade network performance or cause kernel instability over time, potentially leading to service interruptions. This is particularly relevant for organizations relying on Linux-based network infrastructure, embedded devices, or industrial control systems that use Marvell Prestera switches or SoCs. While no direct exploitation for privilege escalation or remote code execution is known, prolonged resource leaks could be leveraged in complex attack scenarios to cause denial of service or facilitate other attacks by destabilizing network components. The impact is more pronounced in environments with high network traffic or long uptimes where resource leaks accumulate. European enterprises in telecommunications, data centers, cloud providers, and critical infrastructure sectors that deploy Linux-based networking hardware may face operational risks if this vulnerability is unpatched. However, the absence of known exploits and the nature of the flaw suggest a moderate risk level if mitigations are applied promptly.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating their Linux kernel to a version that includes the patch fixing CVE-2022-48859. Specifically, ensure that the Marvell Prestera driver code has the missing of_node_put() call added to prevent reference count leaks. For systems where immediate kernel upgrades are not feasible, organizations should monitor network driver stability and resource usage closely to detect signs of resource leaks or degradation. Implementing kernel live patching solutions where available can reduce downtime and exposure. Additionally, organizations should audit their network infrastructure to identify devices using the Marvell Prestera driver and assess their exposure. Network segmentation and limiting access to critical Linux-based network devices can reduce the attack surface. Regular system and kernel logs should be reviewed for anomalies related to network driver failures or memory leaks. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions caused by this or related kernel issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-16T11:38:08.919Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe63de

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 6/30/2025, 10:54:57 PM

Last updated: 7/31/2025, 9:54:28 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats