CVE-2022-49224: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init kobject_init_and_add() takes reference even when it fails. According to the doc of kobject_init_and_add(): If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Fix memory leak by calling kobject_put().
AI Analysis
Technical Summary
CVE-2022-49224 is a vulnerability identified in the Linux kernel, specifically within the power supply subsystem related to the AB8500 fuel gauge driver (ab8500_fg_sysfs_init). The issue arises from improper memory management in the function kobject_init_and_add(). This function is responsible for initializing and adding a kobject, which is a kernel object used for representing kernel entities in sysfs. According to the documented behavior of kobject_init_and_add(), if the function fails and returns an error, the caller must invoke kobject_put() to release the reference and properly clean up the allocated memory. The vulnerability is a memory leak caused by the failure to call kobject_put() when kobject_init_and_add() fails, leading to unreleased memory references. This leak occurs during the initialization of the AB8500 fuel gauge sysfs interface, which is part of the power supply subsystem in the Linux kernel. Although this vulnerability does not directly lead to code execution or privilege escalation, it can cause a gradual increase in kernel memory usage, potentially leading to resource exhaustion or system instability over time, especially on devices heavily relying on the affected driver. The vulnerability affects specific versions of the Linux kernel identified by the commit hash 8c0984e5a75337df513047ec92a6c09d78e3e5cd. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The fix involves ensuring that kobject_put() is called to properly release memory when kobject_init_and_add() fails, thereby preventing the memory leak.
Potential Impact
For European organizations, the impact of CVE-2022-49224 is generally limited but should not be overlooked. Organizations running Linux systems with the affected kernel versions and utilizing hardware that depends on the AB8500 power supply driver—commonly found in certain embedded devices or mobile platforms—may experience memory leaks that degrade system performance or cause instability over time. This can lead to increased maintenance costs, unexpected system reboots, or downtime, particularly in environments where uptime and reliability are critical, such as industrial control systems, telecommunications infrastructure, or embedded IoT devices. While the vulnerability does not directly compromise confidentiality or integrity, the availability of affected systems could be impacted if the memory leak leads to resource exhaustion. This is especially relevant for European sectors with stringent uptime requirements like finance, healthcare, and critical infrastructure. Since no known exploits exist, the immediate risk is low, but the vulnerability should be addressed proactively to avoid potential future exploitation or operational issues.
Mitigation Recommendations
To mitigate CVE-2022-49224, European organizations should: 1) Identify and inventory Linux systems running kernel versions that include the affected commit (8c0984e5a75337df513047ec92a6c09d78e3e5cd) or earlier versions that contain the vulnerable code. 2) Apply the official Linux kernel patches that fix the memory leak by ensuring kobject_put() is called on failure paths in kobject_init_and_add(). This may require updating the kernel to a patched version or backporting the fix for long-term support kernels. 3) For embedded or specialized devices using the AB8500 power supply driver, coordinate with hardware vendors to obtain firmware or kernel updates that include the fix. 4) Monitor system memory usage on affected devices to detect abnormal increases that could indicate the presence of the leak. 5) Implement proactive system restarts or memory management policies as a temporary measure if patching is delayed, to prevent resource exhaustion. 6) Maintain robust patch management and vulnerability scanning processes to quickly identify and remediate similar kernel vulnerabilities in the future. 7) Document and test kernel updates in controlled environments before deployment to avoid unintended disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2022-49224: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init kobject_init_and_add() takes reference even when it fails. According to the doc of kobject_init_and_add(): If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Fix memory leak by calling kobject_put().
AI-Powered Analysis
Technical Analysis
CVE-2022-49224 is a vulnerability identified in the Linux kernel, specifically within the power supply subsystem related to the AB8500 fuel gauge driver (ab8500_fg_sysfs_init). The issue arises from improper memory management in the function kobject_init_and_add(). This function is responsible for initializing and adding a kobject, which is a kernel object used for representing kernel entities in sysfs. According to the documented behavior of kobject_init_and_add(), if the function fails and returns an error, the caller must invoke kobject_put() to release the reference and properly clean up the allocated memory. The vulnerability is a memory leak caused by the failure to call kobject_put() when kobject_init_and_add() fails, leading to unreleased memory references. This leak occurs during the initialization of the AB8500 fuel gauge sysfs interface, which is part of the power supply subsystem in the Linux kernel. Although this vulnerability does not directly lead to code execution or privilege escalation, it can cause a gradual increase in kernel memory usage, potentially leading to resource exhaustion or system instability over time, especially on devices heavily relying on the affected driver. The vulnerability affects specific versions of the Linux kernel identified by the commit hash 8c0984e5a75337df513047ec92a6c09d78e3e5cd. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The fix involves ensuring that kobject_put() is called to properly release memory when kobject_init_and_add() fails, thereby preventing the memory leak.
Potential Impact
For European organizations, the impact of CVE-2022-49224 is generally limited but should not be overlooked. Organizations running Linux systems with the affected kernel versions and utilizing hardware that depends on the AB8500 power supply driver—commonly found in certain embedded devices or mobile platforms—may experience memory leaks that degrade system performance or cause instability over time. This can lead to increased maintenance costs, unexpected system reboots, or downtime, particularly in environments where uptime and reliability are critical, such as industrial control systems, telecommunications infrastructure, or embedded IoT devices. While the vulnerability does not directly compromise confidentiality or integrity, the availability of affected systems could be impacted if the memory leak leads to resource exhaustion. This is especially relevant for European sectors with stringent uptime requirements like finance, healthcare, and critical infrastructure. Since no known exploits exist, the immediate risk is low, but the vulnerability should be addressed proactively to avoid potential future exploitation or operational issues.
Mitigation Recommendations
To mitigate CVE-2022-49224, European organizations should: 1) Identify and inventory Linux systems running kernel versions that include the affected commit (8c0984e5a75337df513047ec92a6c09d78e3e5cd) or earlier versions that contain the vulnerable code. 2) Apply the official Linux kernel patches that fix the memory leak by ensuring kobject_put() is called on failure paths in kobject_init_and_add(). This may require updating the kernel to a patched version or backporting the fix for long-term support kernels. 3) For embedded or specialized devices using the AB8500 power supply driver, coordinate with hardware vendors to obtain firmware or kernel updates that include the fix. 4) Monitor system memory usage on affected devices to detect abnormal increases that could indicate the presence of the leak. 5) Implement proactive system restarts or memory management policies as a temporary measure if patching is delayed, to prevent resource exhaustion. 6) Maintain robust patch management and vulnerability scanning processes to quickly identify and remediate similar kernel vulnerabilities in the future. 7) Document and test kernel updates in controlled environments before deployment to avoid unintended disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.293Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe532d
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 4:26:44 AM
Last updated: 11/22/2025, 5:54:54 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.