Skip to main content

CVE-2022-49342: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49342cvecve-2022-49342
Published: Wed Feb 26 2025 (02/26/2025, 02:10:58 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 06:09:51 UTC

Technical Analysis

CVE-2022-49342 addresses a vulnerability in the Linux kernel specifically within the Ethernet driver for Broadcom's Gigabit MAC (bgmac) over the Broadcom Corporation's BCMA bus (bcma_mdio_mii_register). The issue involves a reference count leak caused by improper handling of device tree nodes. The function of_get_child_by_name() returns a node pointer with an incremented reference count, which must be decremented by calling of_node_put() when the node is no longer needed. Failure to do so results in a reference count leak, which can lead to resource exhaustion over time. This vulnerability is a memory management flaw rather than a direct code execution or privilege escalation vulnerability. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. Although this vulnerability does not have known exploits in the wild and lacks a CVSS score, it affects the Linux kernel's networking subsystem, which is widely used across many distributions and devices. The affected versions are identified by specific commit hashes, indicating that the issue is present in certain kernel builds prior to the patch. The vulnerability is subtle and primarily impacts system stability and resource management rather than immediate security compromise.

Potential Impact

For European organizations, the impact of CVE-2022-49342 is primarily related to system reliability and availability. Linux is extensively deployed in servers, networking equipment, embedded systems, and cloud infrastructure across Europe. A reference count leak in the Ethernet driver could cause gradual resource depletion, potentially leading to degraded network performance or system crashes if the leak accumulates over time. This could disrupt critical services, especially in environments with high network traffic or long uptimes such as data centers, telecom infrastructure, and industrial control systems. While the vulnerability does not directly expose systems to remote code execution or privilege escalation, the resulting instability could be exploited indirectly by attackers to cause denial of service or to facilitate further attacks. Organizations relying on Linux-based networking hardware or embedded devices using the affected driver should be aware of potential operational risks. The absence of known exploits reduces immediate threat but does not eliminate the need for remediation to maintain robust network operations.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel versions to include the patch that fixes CVE-2022-49342. Specifically, they should ensure that their Linux distributions or custom kernel builds incorporate the commit that adds the missing of_node_put() call in the bgmac Ethernet driver. For embedded devices or network appliances using Broadcom BCMA bus drivers, firmware or kernel updates from vendors should be applied promptly. Network administrators should monitor system logs and resource usage for signs of reference count leaks or related memory exhaustion issues. Implementing proactive kernel update policies and testing patches in staging environments before production deployment will reduce operational risks. Additionally, organizations should engage with hardware and software vendors to confirm the presence of this fix in their products. Where immediate patching is not feasible, system reboots can temporarily mitigate resource leaks but are not a long-term solution. Finally, maintaining comprehensive network monitoring and incident response capabilities will help detect any unusual behavior potentially linked to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.542Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5708

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:09:51 AM

Last updated: 8/12/2025, 7:03:44 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats