Skip to main content

CVE-2022-48961: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48961cvecve-2022-48961
Published: Mon Oct 21 2024 (10/21/2024, 20:05:45 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: mdio: fix unbalanced fwnode reference count in mdio_device_release() There is warning report about of_node refcount leak while probing mdio device: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /spi/soc@0/mdio@710700c0/ethernet@4 In of_mdiobus_register_device(), we increase fwnode refcount by fwnode_handle_get() before associating the of_node with mdio device, but it has never been decreased in normal path. Since that, in mdio_device_release(), it needs to call fwnode_handle_put() in addition instead of calling kfree() directly. After above, just calling mdio_device_free() in the error handle path of of_mdiobus_register_device() is enough to keep the refcount balanced.

AI-Powered Analysis

AILast updated: 07/01/2025, 00:27:22 UTC

Technical Analysis

CVE-2022-48961 is a vulnerability identified in the Linux kernel related to the handling of reference counts for firmware node (fwnode) objects within the MDIO (Management Data Input/Output) subsystem. Specifically, the issue arises in the mdio_device_release() function where the reference count for the fwnode associated with an MDIO device is not properly decremented, resulting in an unbalanced reference count. During the probing of an MDIO device, the function of_mdiobus_register_device() increments the fwnode reference count via fwnode_handle_get() when associating the device with its device tree node (of_node). However, the corresponding decrement operation (fwnode_handle_put()) was missing in the normal release path. Instead, the code incorrectly called kfree() directly, which does not adjust the reference count. This leads to a memory leak as the reference count remains artificially high, causing the firmware node object to persist longer than necessary. The issue manifests as warning messages indicating a refcount leak during device probing, such as "OF: ERROR: memory leak, expected refcount 1 instead of 2". The fix involves adding a call to fwnode_handle_put() in mdio_device_release() to properly balance the reference count and modifying error handling in of_mdiobus_register_device() to rely on mdio_device_free() for cleanup, ensuring no leaks occur. This vulnerability is primarily a resource management bug causing memory leaks rather than a direct code execution or privilege escalation flaw. It affects Linux kernel versions identified by the commit hash a9049e0c513c4521dbfaa302af8ed08b3366b41f and was published on October 21, 2024. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2022-48961 is primarily related to system stability and resource exhaustion rather than direct compromise of confidentiality or integrity. Systems running affected Linux kernel versions that utilize MDIO devices—commonly found in network interface controllers and embedded systems—may experience memory leaks during device probing or operation. Over time, these leaks could accumulate, potentially leading to degraded system performance, increased memory usage, or in extreme cases, denial of service due to resource exhaustion. This can affect critical infrastructure or network equipment relying on Linux-based embedded devices, such as industrial control systems, telecommunications hardware, or network appliances. While the vulnerability does not enable remote code execution or privilege escalation, the indirect effects on availability could disrupt services or operations. European organizations with large-scale deployments of Linux-based network devices or embedded systems should be aware of this risk, especially in sectors like manufacturing, energy, and telecommunications where MDIO devices are prevalent. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or stability issues.

Mitigation Recommendations

To mitigate CVE-2022-48961, European organizations should: 1) Apply the official Linux kernel patches that address the reference count imbalance in the MDIO subsystem as soon as they become available from trusted sources or Linux distributions. 2) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain updated firmware or kernel versions incorporating the fix. 3) Monitor system logs for warnings related to "OF: ERROR: memory leak" or refcount imbalances during device probing, which may indicate the presence of the vulnerability. 4) Implement proactive memory and resource monitoring on critical Linux systems to detect abnormal memory usage patterns that could signal leaks. 5) Where feasible, isolate affected devices or limit their exposure to critical network segments to reduce impact in case of service degradation. 6) Maintain an inventory of devices using MDIO interfaces and track kernel versions to prioritize patching efforts. 7) Engage in regular kernel updates as part of patch management to ensure timely remediation of such resource management vulnerabilities. These steps go beyond generic advice by focusing on device-specific monitoring, vendor coordination, and proactive detection of symptoms related to this particular memory leak.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-22T01:27:53.628Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982fc4522896dcbe6753

Added to database: 5/21/2025, 9:09:03 AM

Last enriched: 7/1/2025, 12:27:22 AM

Last updated: 8/7/2025, 1:30:19 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats