CVE-2022-48965: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: gpio/rockchip: fix refcount leak in rockchip_gpiolib_register() The node returned by of_get_parent() with refcount incremented, of_node_put() needs be called when finish using it. So add it in the end of of_pinctrl_get().
AI Analysis
Technical Summary
CVE-2022-48965 is a vulnerability identified in the Linux kernel specifically within the gpio/rockchip subsystem. The issue arises from a reference count leak in the function rockchip_gpiolib_register(). The root cause is improper management of device tree node references: the function of_get_parent() returns a node with its reference count incremented, but the corresponding release function of_node_put() was not called after usage. This leads to a reference count leak because the reference is never decremented, causing the kernel to hold onto resources longer than necessary. The fix involves adding the missing of_node_put() call at the end of of_pinctrl_get(), ensuring proper cleanup of the node reference. While this vulnerability does not directly expose a memory corruption or privilege escalation vector, reference count leaks can lead to resource exhaustion over time, potentially causing system instability or denial of service (DoS) conditions. The affected code is part of the Rockchip GPIO driver, which is used in devices based on Rockchip SoCs (System on Chips), commonly found in embedded Linux systems such as single-board computers, IoT devices, and some consumer electronics. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability was published recently, indicating it is a newly disclosed issue with a patch available in the Linux kernel source code.
Potential Impact
For European organizations, the impact of CVE-2022-48965 depends largely on their use of Linux systems running on Rockchip hardware. Enterprises deploying embedded Linux devices, industrial control systems, or IoT infrastructure based on Rockchip SoCs could be vulnerable to resource exhaustion leading to denial of service. This could disrupt critical operations, especially in sectors like manufacturing, telecommunications, and smart city infrastructure where embedded Linux devices are prevalent. Although the vulnerability does not directly allow code execution or privilege escalation, the potential for system instability or crashes due to resource leaks can affect availability and reliability of services. Organizations relying on Linux-based edge devices or gateways with Rockchip components should be aware of this risk. The absence of known exploits reduces immediate threat, but unpatched systems remain vulnerable to potential future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2022-48965, organizations should: 1) Identify all Linux systems running Rockchip-based kernels or devices, including embedded and IoT devices. 2) Apply the latest Linux kernel patches that include the fix for the reference count leak, ensuring that the of_node_put() call is properly implemented in the gpio/rockchip driver. 3) For devices where kernel updates are not straightforward, consider vendor firmware updates or consult device manufacturers for patched versions. 4) Monitor system logs and resource usage on affected devices for signs of resource exhaustion or instability that could indicate exploitation or impact from the leak. 5) Implement robust device lifecycle management to ensure embedded systems receive timely security updates. 6) Where possible, isolate critical embedded devices from public networks to reduce exposure. 7) Conduct regular security audits of embedded Linux devices to detect outdated kernels or vulnerable configurations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-48965: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: gpio/rockchip: fix refcount leak in rockchip_gpiolib_register() The node returned by of_get_parent() with refcount incremented, of_node_put() needs be called when finish using it. So add it in the end of of_pinctrl_get().
AI-Powered Analysis
Technical Analysis
CVE-2022-48965 is a vulnerability identified in the Linux kernel specifically within the gpio/rockchip subsystem. The issue arises from a reference count leak in the function rockchip_gpiolib_register(). The root cause is improper management of device tree node references: the function of_get_parent() returns a node with its reference count incremented, but the corresponding release function of_node_put() was not called after usage. This leads to a reference count leak because the reference is never decremented, causing the kernel to hold onto resources longer than necessary. The fix involves adding the missing of_node_put() call at the end of of_pinctrl_get(), ensuring proper cleanup of the node reference. While this vulnerability does not directly expose a memory corruption or privilege escalation vector, reference count leaks can lead to resource exhaustion over time, potentially causing system instability or denial of service (DoS) conditions. The affected code is part of the Rockchip GPIO driver, which is used in devices based on Rockchip SoCs (System on Chips), commonly found in embedded Linux systems such as single-board computers, IoT devices, and some consumer electronics. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability was published recently, indicating it is a newly disclosed issue with a patch available in the Linux kernel source code.
Potential Impact
For European organizations, the impact of CVE-2022-48965 depends largely on their use of Linux systems running on Rockchip hardware. Enterprises deploying embedded Linux devices, industrial control systems, or IoT infrastructure based on Rockchip SoCs could be vulnerable to resource exhaustion leading to denial of service. This could disrupt critical operations, especially in sectors like manufacturing, telecommunications, and smart city infrastructure where embedded Linux devices are prevalent. Although the vulnerability does not directly allow code execution or privilege escalation, the potential for system instability or crashes due to resource leaks can affect availability and reliability of services. Organizations relying on Linux-based edge devices or gateways with Rockchip components should be aware of this risk. The absence of known exploits reduces immediate threat, but unpatched systems remain vulnerable to potential future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2022-48965, organizations should: 1) Identify all Linux systems running Rockchip-based kernels or devices, including embedded and IoT devices. 2) Apply the latest Linux kernel patches that include the fix for the reference count leak, ensuring that the of_node_put() call is properly implemented in the gpio/rockchip driver. 3) For devices where kernel updates are not straightforward, consider vendor firmware updates or consult device manufacturers for patched versions. 4) Monitor system logs and resource usage on affected devices for signs of resource exhaustion or instability that could indicate exploitation or impact from the leak. 5) Implement robust device lifecycle management to ensure embedded systems receive timely security updates. 6) Where possible, isolate critical embedded devices from public networks to reduce exposure. 7) Conduct regular security audits of embedded Linux devices to detect outdated kernels or vulnerable configurations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-22T01:27:53.628Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982fc4522896dcbe676b
Added to database: 5/21/2025, 9:09:03 AM
Last enriched: 7/1/2025, 12:28:19 AM
Last updated: 8/9/2025, 8:37:57 PM
Views: 13
Related Threats
CVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.