CVE-2022-48961: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: mdio: fix unbalanced fwnode reference count in mdio_device_release() There is warning report about of_node refcount leak while probing mdio device: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /spi/soc@0/mdio@710700c0/ethernet@4 In of_mdiobus_register_device(), we increase fwnode refcount by fwnode_handle_get() before associating the of_node with mdio device, but it has never been decreased in normal path. Since that, in mdio_device_release(), it needs to call fwnode_handle_put() in addition instead of calling kfree() directly. After above, just calling mdio_device_free() in the error handle path of of_mdiobus_register_device() is enough to keep the refcount balanced.
AI Analysis
Technical Summary
CVE-2022-48961 is a vulnerability identified in the Linux kernel related to the handling of reference counts for firmware node (fwnode) objects within the MDIO (Management Data Input/Output) subsystem. Specifically, the issue arises in the mdio_device_release() function where the reference count for the fwnode associated with an MDIO device is not properly decremented, resulting in an unbalanced reference count. During the probing of an MDIO device, the function of_mdiobus_register_device() increments the fwnode reference count via fwnode_handle_get() when associating the device with its device tree node (of_node). However, the corresponding decrement operation (fwnode_handle_put()) was missing in the normal release path. Instead, the code incorrectly called kfree() directly, which does not adjust the reference count. This leads to a memory leak as the reference count remains artificially high, causing the firmware node object to persist longer than necessary. The issue manifests as warning messages indicating a refcount leak during device probing, such as "OF: ERROR: memory leak, expected refcount 1 instead of 2". The fix involves adding a call to fwnode_handle_put() in mdio_device_release() to properly balance the reference count and modifying error handling in of_mdiobus_register_device() to rely on mdio_device_free() for cleanup, ensuring no leaks occur. This vulnerability is primarily a resource management bug causing memory leaks rather than a direct code execution or privilege escalation flaw. It affects Linux kernel versions identified by the commit hash a9049e0c513c4521dbfaa302af8ed08b3366b41f and was published on October 21, 2024. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-48961 is primarily related to system stability and resource exhaustion rather than direct compromise of confidentiality or integrity. Systems running affected Linux kernel versions that utilize MDIO devices—commonly found in network interface controllers and embedded systems—may experience memory leaks during device probing or operation. Over time, these leaks could accumulate, potentially leading to degraded system performance, increased memory usage, or in extreme cases, denial of service due to resource exhaustion. This can affect critical infrastructure or network equipment relying on Linux-based embedded devices, such as industrial control systems, telecommunications hardware, or network appliances. While the vulnerability does not enable remote code execution or privilege escalation, the indirect effects on availability could disrupt services or operations. European organizations with large-scale deployments of Linux-based network devices or embedded systems should be aware of this risk, especially in sectors like manufacturing, energy, and telecommunications where MDIO devices are prevalent. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or stability issues.
Mitigation Recommendations
To mitigate CVE-2022-48961, European organizations should: 1) Apply the official Linux kernel patches that address the reference count imbalance in the MDIO subsystem as soon as they become available from trusted sources or Linux distributions. 2) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain updated firmware or kernel versions incorporating the fix. 3) Monitor system logs for warnings related to "OF: ERROR: memory leak" or refcount imbalances during device probing, which may indicate the presence of the vulnerability. 4) Implement proactive memory and resource monitoring on critical Linux systems to detect abnormal memory usage patterns that could signal leaks. 5) Where feasible, isolate affected devices or limit their exposure to critical network segments to reduce impact in case of service degradation. 6) Maintain an inventory of devices using MDIO interfaces and track kernel versions to prioritize patching efforts. 7) Engage in regular kernel updates as part of patch management to ensure timely remediation of such resource management vulnerabilities. These steps go beyond generic advice by focusing on device-specific monitoring, vendor coordination, and proactive detection of symptoms related to this particular memory leak.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-48961: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: mdio: fix unbalanced fwnode reference count in mdio_device_release() There is warning report about of_node refcount leak while probing mdio device: OF: ERROR: memory leak, expected refcount 1 instead of 2, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /spi/soc@0/mdio@710700c0/ethernet@4 In of_mdiobus_register_device(), we increase fwnode refcount by fwnode_handle_get() before associating the of_node with mdio device, but it has never been decreased in normal path. Since that, in mdio_device_release(), it needs to call fwnode_handle_put() in addition instead of calling kfree() directly. After above, just calling mdio_device_free() in the error handle path of of_mdiobus_register_device() is enough to keep the refcount balanced.
AI-Powered Analysis
Technical Analysis
CVE-2022-48961 is a vulnerability identified in the Linux kernel related to the handling of reference counts for firmware node (fwnode) objects within the MDIO (Management Data Input/Output) subsystem. Specifically, the issue arises in the mdio_device_release() function where the reference count for the fwnode associated with an MDIO device is not properly decremented, resulting in an unbalanced reference count. During the probing of an MDIO device, the function of_mdiobus_register_device() increments the fwnode reference count via fwnode_handle_get() when associating the device with its device tree node (of_node). However, the corresponding decrement operation (fwnode_handle_put()) was missing in the normal release path. Instead, the code incorrectly called kfree() directly, which does not adjust the reference count. This leads to a memory leak as the reference count remains artificially high, causing the firmware node object to persist longer than necessary. The issue manifests as warning messages indicating a refcount leak during device probing, such as "OF: ERROR: memory leak, expected refcount 1 instead of 2". The fix involves adding a call to fwnode_handle_put() in mdio_device_release() to properly balance the reference count and modifying error handling in of_mdiobus_register_device() to rely on mdio_device_free() for cleanup, ensuring no leaks occur. This vulnerability is primarily a resource management bug causing memory leaks rather than a direct code execution or privilege escalation flaw. It affects Linux kernel versions identified by the commit hash a9049e0c513c4521dbfaa302af8ed08b3366b41f and was published on October 21, 2024. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-48961 is primarily related to system stability and resource exhaustion rather than direct compromise of confidentiality or integrity. Systems running affected Linux kernel versions that utilize MDIO devices—commonly found in network interface controllers and embedded systems—may experience memory leaks during device probing or operation. Over time, these leaks could accumulate, potentially leading to degraded system performance, increased memory usage, or in extreme cases, denial of service due to resource exhaustion. This can affect critical infrastructure or network equipment relying on Linux-based embedded devices, such as industrial control systems, telecommunications hardware, or network appliances. While the vulnerability does not enable remote code execution or privilege escalation, the indirect effects on availability could disrupt services or operations. European organizations with large-scale deployments of Linux-based network devices or embedded systems should be aware of this risk, especially in sectors like manufacturing, energy, and telecommunications where MDIO devices are prevalent. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or stability issues.
Mitigation Recommendations
To mitigate CVE-2022-48961, European organizations should: 1) Apply the official Linux kernel patches that address the reference count imbalance in the MDIO subsystem as soon as they become available from trusted sources or Linux distributions. 2) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain updated firmware or kernel versions incorporating the fix. 3) Monitor system logs for warnings related to "OF: ERROR: memory leak" or refcount imbalances during device probing, which may indicate the presence of the vulnerability. 4) Implement proactive memory and resource monitoring on critical Linux systems to detect abnormal memory usage patterns that could signal leaks. 5) Where feasible, isolate affected devices or limit their exposure to critical network segments to reduce impact in case of service degradation. 6) Maintain an inventory of devices using MDIO interfaces and track kernel versions to prioritize patching efforts. 7) Engage in regular kernel updates as part of patch management to ensure timely remediation of such resource management vulnerabilities. These steps go beyond generic advice by focusing on device-specific monitoring, vendor coordination, and proactive detection of symptoms related to this particular memory leak.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.628Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe6753
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 12:27:22 AM
Last updated: 8/7/2025, 1:30:19 PM
Views: 16
Related Threats
CVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighCVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.