CVE-2022-49342: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI Analysis
Technical Summary
CVE-2022-49342 addresses a vulnerability in the Linux kernel specifically within the Ethernet driver for Broadcom's Gigabit MAC (bgmac) over the Broadcom Corporation's BCMA bus (bcma_mdio_mii_register). The issue involves a reference count leak caused by improper handling of device tree nodes. The function of_get_child_by_name() returns a node pointer with an incremented reference count, which must be decremented by calling of_node_put() when the node is no longer needed. Failure to do so results in a reference count leak, which can lead to resource exhaustion over time. This vulnerability is a memory management flaw rather than a direct code execution or privilege escalation vulnerability. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. Although this vulnerability does not have known exploits in the wild and lacks a CVSS score, it affects the Linux kernel's networking subsystem, which is widely used across many distributions and devices. The affected versions are identified by specific commit hashes, indicating that the issue is present in certain kernel builds prior to the patch. The vulnerability is subtle and primarily impacts system stability and resource management rather than immediate security compromise.
Potential Impact
For European organizations, the impact of CVE-2022-49342 is primarily related to system reliability and availability. Linux is extensively deployed in servers, networking equipment, embedded systems, and cloud infrastructure across Europe. A reference count leak in the Ethernet driver could cause gradual resource depletion, potentially leading to degraded network performance or system crashes if the leak accumulates over time. This could disrupt critical services, especially in environments with high network traffic or long uptimes such as data centers, telecom infrastructure, and industrial control systems. While the vulnerability does not directly expose systems to remote code execution or privilege escalation, the resulting instability could be exploited indirectly by attackers to cause denial of service or to facilitate further attacks. Organizations relying on Linux-based networking hardware or embedded devices using the affected driver should be aware of potential operational risks. The absence of known exploits reduces immediate threat but does not eliminate the need for remediation to maintain robust network operations.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to include the patch that fixes CVE-2022-49342. Specifically, they should ensure that their Linux distributions or custom kernel builds incorporate the commit that adds the missing of_node_put() call in the bgmac Ethernet driver. For embedded devices or network appliances using Broadcom BCMA bus drivers, firmware or kernel updates from vendors should be applied promptly. Network administrators should monitor system logs and resource usage for signs of reference count leaks or related memory exhaustion issues. Implementing proactive kernel update policies and testing patches in staging environments before production deployment will reduce operational risks. Additionally, organizations should engage with hardware and software vendors to confirm the presence of this fix in their products. Where immediate patching is not feasible, system reboots can temporarily mitigate resource leaks but are not a long-term solution. Finally, maintaining comprehensive network monitoring and incident response capabilities will help detect any unusual behavior potentially linked to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland, Poland, Belgium
CVE-2022-49342: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: bgmac: Fix refcount leak in bcma_mdio_mii_register of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49342 addresses a vulnerability in the Linux kernel specifically within the Ethernet driver for Broadcom's Gigabit MAC (bgmac) over the Broadcom Corporation's BCMA bus (bcma_mdio_mii_register). The issue involves a reference count leak caused by improper handling of device tree nodes. The function of_get_child_by_name() returns a node pointer with an incremented reference count, which must be decremented by calling of_node_put() when the node is no longer needed. Failure to do so results in a reference count leak, which can lead to resource exhaustion over time. This vulnerability is a memory management flaw rather than a direct code execution or privilege escalation vulnerability. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. Although this vulnerability does not have known exploits in the wild and lacks a CVSS score, it affects the Linux kernel's networking subsystem, which is widely used across many distributions and devices. The affected versions are identified by specific commit hashes, indicating that the issue is present in certain kernel builds prior to the patch. The vulnerability is subtle and primarily impacts system stability and resource management rather than immediate security compromise.
Potential Impact
For European organizations, the impact of CVE-2022-49342 is primarily related to system reliability and availability. Linux is extensively deployed in servers, networking equipment, embedded systems, and cloud infrastructure across Europe. A reference count leak in the Ethernet driver could cause gradual resource depletion, potentially leading to degraded network performance or system crashes if the leak accumulates over time. This could disrupt critical services, especially in environments with high network traffic or long uptimes such as data centers, telecom infrastructure, and industrial control systems. While the vulnerability does not directly expose systems to remote code execution or privilege escalation, the resulting instability could be exploited indirectly by attackers to cause denial of service or to facilitate further attacks. Organizations relying on Linux-based networking hardware or embedded devices using the affected driver should be aware of potential operational risks. The absence of known exploits reduces immediate threat but does not eliminate the need for remediation to maintain robust network operations.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to include the patch that fixes CVE-2022-49342. Specifically, they should ensure that their Linux distributions or custom kernel builds incorporate the commit that adds the missing of_node_put() call in the bgmac Ethernet driver. For embedded devices or network appliances using Broadcom BCMA bus drivers, firmware or kernel updates from vendors should be applied promptly. Network administrators should monitor system logs and resource usage for signs of reference count leaks or related memory exhaustion issues. Implementing proactive kernel update policies and testing patches in staging environments before production deployment will reduce operational risks. Additionally, organizations should engage with hardware and software vendors to confirm the presence of this fix in their products. Where immediate patching is not feasible, system reboots can temporarily mitigate resource leaks but are not a long-term solution. Finally, maintaining comprehensive network monitoring and incident response capabilities will help detect any unusual behavior potentially linked to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.542Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5708
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:09:51 AM
Last updated: 8/12/2025, 7:03:44 AM
Views: 15
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.