CVE-2022-49351: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: altera: Fix refcount leak in altera_tse_mdio_create Every iteration of for_each_child_of_node() decrements the reference count of the previous node. When break from a for_each_child_of_node() loop, we need to explicitly call of_node_put() on the child node when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI Analysis
Technical Summary
CVE-2022-49351 is a vulnerability identified in the Linux kernel specifically affecting the network subsystem related to the Altera TSE MDIO driver. The issue arises from a reference count leak in the function altera_tse_mdio_create, which is part of the kernel's device tree handling code. The vulnerability is due to improper management of reference counts when iterating over child nodes using the for_each_child_of_node() macro. Each iteration decrements the reference count of the previous node, but if the loop is exited prematurely (via a break statement), the code fails to explicitly call of_node_put() on the current child node, causing a reference count leak. This leak can lead to resource exhaustion in the kernel, potentially degrading system stability or leading to denial of service conditions. The problem is rooted in kernel memory management and device tree node lifecycle handling. The fix involves adding the missing of_node_put() call to ensure proper decrementing of the reference count when the loop is exited early. This vulnerability affects Linux kernel versions identified by the commit hash bbd2190ce96d8fce031f0526c1f970b68adc9d1a and likely other versions containing the same code pattern. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting kernel internals rather than user-space applications directly.
Potential Impact
For European organizations, the impact of CVE-2022-49351 is primarily related to system stability and availability. Systems running vulnerable Linux kernels with the affected Altera TSE MDIO driver could experience resource leaks leading to degraded performance or kernel crashes under certain conditions, especially in environments heavily utilizing the affected network hardware or device tree configurations. This could affect critical infrastructure, industrial control systems, telecommunications equipment, and embedded devices that rely on Linux kernels with this driver. While the vulnerability does not directly enable privilege escalation or remote code execution, the resulting denial of service or system instability could disrupt business operations, cause downtime, and impact service availability. Organizations with large-scale Linux deployments, particularly those using hardware from Altera (now part of Intel) or similar network interface components, may be more susceptible. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2022-49351, European organizations should: 1) Identify all Linux systems running kernels with the affected altera_tse_mdio_create code, focusing on those using Altera TSE MDIO network interfaces or related device tree configurations. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. This may require updating to a newer kernel version or backporting the patch for long-term support kernels. 3) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain firmware or kernel updates addressing this issue. 4) Monitor system logs and kernel messages for signs of resource exhaustion or instability that could indicate the leak is impacting operations. 5) Implement robust system monitoring and automated reboot policies to minimize downtime in case of kernel crashes. 6) Maintain strict change management and testing procedures when deploying kernel updates to avoid unintended disruptions. 7) Limit access to vulnerable systems and restrict user privileges to reduce the risk of accidental triggering of the vulnerability. These steps go beyond generic advice by emphasizing targeted identification of affected hardware, vendor coordination, and operational monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2022-49351: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: altera: Fix refcount leak in altera_tse_mdio_create Every iteration of for_each_child_of_node() decrements the reference count of the previous node. When break from a for_each_child_of_node() loop, we need to explicitly call of_node_put() on the child node when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49351 is a vulnerability identified in the Linux kernel specifically affecting the network subsystem related to the Altera TSE MDIO driver. The issue arises from a reference count leak in the function altera_tse_mdio_create, which is part of the kernel's device tree handling code. The vulnerability is due to improper management of reference counts when iterating over child nodes using the for_each_child_of_node() macro. Each iteration decrements the reference count of the previous node, but if the loop is exited prematurely (via a break statement), the code fails to explicitly call of_node_put() on the current child node, causing a reference count leak. This leak can lead to resource exhaustion in the kernel, potentially degrading system stability or leading to denial of service conditions. The problem is rooted in kernel memory management and device tree node lifecycle handling. The fix involves adding the missing of_node_put() call to ensure proper decrementing of the reference count when the loop is exited early. This vulnerability affects Linux kernel versions identified by the commit hash bbd2190ce96d8fce031f0526c1f970b68adc9d1a and likely other versions containing the same code pattern. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and low-level, impacting kernel internals rather than user-space applications directly.
Potential Impact
For European organizations, the impact of CVE-2022-49351 is primarily related to system stability and availability. Systems running vulnerable Linux kernels with the affected Altera TSE MDIO driver could experience resource leaks leading to degraded performance or kernel crashes under certain conditions, especially in environments heavily utilizing the affected network hardware or device tree configurations. This could affect critical infrastructure, industrial control systems, telecommunications equipment, and embedded devices that rely on Linux kernels with this driver. While the vulnerability does not directly enable privilege escalation or remote code execution, the resulting denial of service or system instability could disrupt business operations, cause downtime, and impact service availability. Organizations with large-scale Linux deployments, particularly those using hardware from Altera (now part of Intel) or similar network interface components, may be more susceptible. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental system failures.
Mitigation Recommendations
To mitigate CVE-2022-49351, European organizations should: 1) Identify all Linux systems running kernels with the affected altera_tse_mdio_create code, focusing on those using Altera TSE MDIO network interfaces or related device tree configurations. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. This may require updating to a newer kernel version or backporting the patch for long-term support kernels. 3) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain firmware or kernel updates addressing this issue. 4) Monitor system logs and kernel messages for signs of resource exhaustion or instability that could indicate the leak is impacting operations. 5) Implement robust system monitoring and automated reboot policies to minimize downtime in case of kernel crashes. 6) Maintain strict change management and testing procedures when deploying kernel updates to avoid unintended disruptions. 7) Limit access to vulnerable systems and restrict user privileges to reduce the risk of accidental triggering of the vulnerability. These steps go beyond generic advice by emphasizing targeted identification of affected hardware, vendor coordination, and operational monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.544Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5757
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:11:36 AM
Last updated: 10/15/2025, 8:23:46 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Africa Remains Top Global Target, Even as Attacks Decline
MediumCVE-2025-61941: Improper limitation of a pathname to a restricted directory ('Path Traversal') in BUFFALO INC. WXR9300BE6P series
HighCVE-2025-11501: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in markomaksym Dynamically Display Posts
HighCVE-2025-55039: CWE-347 Improper Verification of Cryptographic Signature in Apache Software Foundation Apache Spark
UnknownCVE-2025-11161: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in wpbakery WPBakery Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.