Skip to main content

CVE-2022-49211: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49211cvecve-2022-49211
Published: Wed Feb 26 2025 (02/26/2025, 01:55:48 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mips: cdmm: Fix refcount leak in mips_cdmm_phys_base The of_find_compatible_node() function returns a node pointer with refcount incremented, We should use of_node_put() on it when done Add the missing of_node_put() to release the refcount.

AI-Powered Analysis

AILast updated: 06/30/2025, 04:13:22 UTC

Technical Analysis

CVE-2022-49211 is a vulnerability identified in the Linux kernel, specifically related to the MIPS architecture's cdmm (Core Dynamic Memory Management) subsystem. The issue arises from a refcount leak in the function mips_cdmm_phys_base. The root cause is the improper handling of device tree node references: the function of_find_compatible_node() returns a pointer to a device tree node with its reference count incremented, but the corresponding release function of_node_put() was not called after usage. This omission leads to a reference count leak, which can cause resource exhaustion over time. While the vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system stability and availability, especially on devices or systems heavily relying on the MIPS architecture and the affected kernel versions. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. The affected versions are identified by a specific commit hash, indicating that this issue is present in certain Linux kernel builds prior to the patch. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2022-49211 is on system reliability and availability rather than direct compromise of confidentiality or integrity. Systems running Linux kernels on MIPS architecture devices—commonly embedded systems, network equipment, or specialized industrial hardware—may experience gradual resource depletion due to the refcount leak. This can lead to degraded performance, system instability, or crashes, potentially disrupting critical operations. Organizations in sectors such as telecommunications, manufacturing, and infrastructure that utilize MIPS-based Linux devices could be affected. Although the vulnerability does not currently have known exploits, unpatched systems may be vulnerable to denial-of-service conditions if the leak accumulates sufficiently. The impact is less relevant for typical x86 or ARM-based Linux deployments prevalent in general IT infrastructure but remains significant for niche environments relying on MIPS hardware.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify and inventory all Linux systems running on MIPS architecture, particularly embedded devices and network equipment. 2) Verify the kernel versions and commit hashes to determine if they include the vulnerable code. 3) Apply the official Linux kernel patches that address CVE-2022-49211 by adding the missing of_node_put() call to release the reference count properly. 4) For devices where kernel patching is not straightforward, consider firmware updates or vendor-provided patches that incorporate the fix. 5) Monitor system logs and resource usage for signs of refcount leaks or related instability. 6) Implement proactive maintenance schedules to update embedded systems regularly, as these are often overlooked in patch management. 7) Engage with hardware vendors to confirm the status of this vulnerability in their products and request updates if necessary.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.292Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5293

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 4:13:22 AM

Last updated: 8/14/2025, 10:10:27 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats