CVE-2022-49211: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: mips: cdmm: Fix refcount leak in mips_cdmm_phys_base The of_find_compatible_node() function returns a node pointer with refcount incremented, We should use of_node_put() on it when done Add the missing of_node_put() to release the refcount.
AI Analysis
Technical Summary
CVE-2022-49211 is a vulnerability identified in the Linux kernel, specifically related to the MIPS architecture's cdmm (Core Dynamic Memory Management) subsystem. The issue arises from a refcount leak in the function mips_cdmm_phys_base. The root cause is the improper handling of device tree node references: the function of_find_compatible_node() returns a pointer to a device tree node with its reference count incremented, but the corresponding release function of_node_put() was not called after usage. This omission leads to a reference count leak, which can cause resource exhaustion over time. While the vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system stability and availability, especially on devices or systems heavily relying on the MIPS architecture and the affected kernel versions. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. The affected versions are identified by a specific commit hash, indicating that this issue is present in certain Linux kernel builds prior to the patch. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2022-49211 is on system reliability and availability rather than direct compromise of confidentiality or integrity. Systems running Linux kernels on MIPS architecture devices—commonly embedded systems, network equipment, or specialized industrial hardware—may experience gradual resource depletion due to the refcount leak. This can lead to degraded performance, system instability, or crashes, potentially disrupting critical operations. Organizations in sectors such as telecommunications, manufacturing, and infrastructure that utilize MIPS-based Linux devices could be affected. Although the vulnerability does not currently have known exploits, unpatched systems may be vulnerable to denial-of-service conditions if the leak accumulates sufficiently. The impact is less relevant for typical x86 or ARM-based Linux deployments prevalent in general IT infrastructure but remains significant for niche environments relying on MIPS hardware.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all Linux systems running on MIPS architecture, particularly embedded devices and network equipment. 2) Verify the kernel versions and commit hashes to determine if they include the vulnerable code. 3) Apply the official Linux kernel patches that address CVE-2022-49211 by adding the missing of_node_put() call to release the reference count properly. 4) For devices where kernel patching is not straightforward, consider firmware updates or vendor-provided patches that incorporate the fix. 5) Monitor system logs and resource usage for signs of refcount leaks or related instability. 6) Implement proactive maintenance schedules to update embedded systems regularly, as these are often overlooked in patch management. 7) Engage with hardware vendors to confirm the status of this vulnerability in their products and request updates if necessary.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-49211: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: mips: cdmm: Fix refcount leak in mips_cdmm_phys_base The of_find_compatible_node() function returns a node pointer with refcount incremented, We should use of_node_put() on it when done Add the missing of_node_put() to release the refcount.
AI-Powered Analysis
Technical Analysis
CVE-2022-49211 is a vulnerability identified in the Linux kernel, specifically related to the MIPS architecture's cdmm (Core Dynamic Memory Management) subsystem. The issue arises from a refcount leak in the function mips_cdmm_phys_base. The root cause is the improper handling of device tree node references: the function of_find_compatible_node() returns a pointer to a device tree node with its reference count incremented, but the corresponding release function of_node_put() was not called after usage. This omission leads to a reference count leak, which can cause resource exhaustion over time. While the vulnerability does not directly allow code execution or privilege escalation, the leak can degrade system stability and availability, especially on devices or systems heavily relying on the MIPS architecture and the affected kernel versions. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. The affected versions are identified by a specific commit hash, indicating that this issue is present in certain Linux kernel builds prior to the patch. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2022-49211 is on system reliability and availability rather than direct compromise of confidentiality or integrity. Systems running Linux kernels on MIPS architecture devices—commonly embedded systems, network equipment, or specialized industrial hardware—may experience gradual resource depletion due to the refcount leak. This can lead to degraded performance, system instability, or crashes, potentially disrupting critical operations. Organizations in sectors such as telecommunications, manufacturing, and infrastructure that utilize MIPS-based Linux devices could be affected. Although the vulnerability does not currently have known exploits, unpatched systems may be vulnerable to denial-of-service conditions if the leak accumulates sufficiently. The impact is less relevant for typical x86 or ARM-based Linux deployments prevalent in general IT infrastructure but remains significant for niche environments relying on MIPS hardware.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify and inventory all Linux systems running on MIPS architecture, particularly embedded devices and network equipment. 2) Verify the kernel versions and commit hashes to determine if they include the vulnerable code. 3) Apply the official Linux kernel patches that address CVE-2022-49211 by adding the missing of_node_put() call to release the reference count properly. 4) For devices where kernel patching is not straightforward, consider firmware updates or vendor-provided patches that incorporate the fix. 5) Monitor system logs and resource usage for signs of refcount leaks or related instability. 6) Implement proactive maintenance schedules to update embedded systems regularly, as these are often overlooked in patch management. 7) Engage with hardware vendors to confirm the status of this vulnerability in their products and request updates if necessary.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.292Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5293
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 4:13:22 AM
Last updated: 8/14/2025, 10:10:27 PM
Views: 11
Related Threats
CVE-2025-55455: n/a
HighCVE-2025-8193
UnknownCVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.