CVE-2022-49367: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. mv88e6xxx_mdio_register() pass the device node to of_mdiobus_register(). We don't need the device node after it. Add missing of_node_put() to avoid refcount leak.
AI Analysis
Technical Summary
CVE-2022-49367 is a vulnerability identified in the Linux kernel, specifically within the driver code for the Marvell mv88e6xxx series Ethernet switches, which is part of the Distributed Switch Architecture (DSA) subsystem. The issue stems from a reference count leak in the function mv88e6xxx_mdios_register. The root cause is related to improper management of device tree node references: the function of_get_child_by_name() returns a device node pointer with an incremented reference count, which must be decremented using of_node_put() once the node is no longer needed. In this case, the device node is passed to of_mdiobus_register(), but the driver code fails to release the reference afterward, leading to a refcount leak. Over time, this leak can cause resource exhaustion in kernel memory management, potentially degrading system stability or causing denial of service due to kernel memory depletion. The vulnerability does not directly allow code execution or privilege escalation but can impact system availability. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. This vulnerability affects Linux kernel versions containing the affected commit a3c53be55c955b7150cda17874c3fcb4eeb97a89 and similar versions where this driver code is present. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and subtle, requiring in-depth kernel knowledge to exploit or detect.
Potential Impact
For European organizations, the impact of CVE-2022-49367 is primarily related to system stability and availability rather than confidentiality or integrity. Organizations running Linux-based systems with kernel versions including the mv88e6xxx DSA driver—commonly found in embedded systems, network appliances, or specialized industrial equipment using Marvell Ethernet switches—may experience gradual resource leaks leading to kernel memory exhaustion. This can cause system slowdowns, crashes, or reboots, potentially disrupting critical network infrastructure or industrial control systems. While the vulnerability does not enable direct remote code execution or privilege escalation, the resulting denial of service could impact network reliability and availability of services. European enterprises relying on Linux for networking hardware, telecommunications, or industrial automation should be aware of this risk. Given the lack of known exploits, the immediate threat level is moderate, but unpatched systems could face stability issues over time, especially in environments with high network traffic or long uptimes.
Mitigation Recommendations
To mitigate CVE-2022-49367, European organizations should: 1) Identify Linux systems using the mv88e6xxx DSA driver, particularly those running kernel versions around the affected commit. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to the mv88e6xxx_mdios_register function as soon as they become available from trusted sources or Linux distributions. 3) For systems where patching the kernel is not immediately feasible, implement monitoring of kernel memory usage and system logs to detect early signs of resource leaks or instability. 4) Consider rebooting affected systems periodically as a temporary measure to clear leaked references and free kernel memory. 5) Engage with hardware vendors or Linux distribution maintainers to obtain updated kernel packages incorporating the fix. 6) Maintain a robust incident response plan to handle potential service disruptions caused by this vulnerability. These steps go beyond generic advice by focusing on identifying specific affected drivers, monitoring kernel resource usage, and coordinating with vendors for timely patching.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2022-49367: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. mv88e6xxx_mdio_register() pass the device node to of_mdiobus_register(). We don't need the device node after it. Add missing of_node_put() to avoid refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49367 is a vulnerability identified in the Linux kernel, specifically within the driver code for the Marvell mv88e6xxx series Ethernet switches, which is part of the Distributed Switch Architecture (DSA) subsystem. The issue stems from a reference count leak in the function mv88e6xxx_mdios_register. The root cause is related to improper management of device tree node references: the function of_get_child_by_name() returns a device node pointer with an incremented reference count, which must be decremented using of_node_put() once the node is no longer needed. In this case, the device node is passed to of_mdiobus_register(), but the driver code fails to release the reference afterward, leading to a refcount leak. Over time, this leak can cause resource exhaustion in kernel memory management, potentially degrading system stability or causing denial of service due to kernel memory depletion. The vulnerability does not directly allow code execution or privilege escalation but can impact system availability. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. This vulnerability affects Linux kernel versions containing the affected commit a3c53be55c955b7150cda17874c3fcb4eeb97a89 and similar versions where this driver code is present. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and subtle, requiring in-depth kernel knowledge to exploit or detect.
Potential Impact
For European organizations, the impact of CVE-2022-49367 is primarily related to system stability and availability rather than confidentiality or integrity. Organizations running Linux-based systems with kernel versions including the mv88e6xxx DSA driver—commonly found in embedded systems, network appliances, or specialized industrial equipment using Marvell Ethernet switches—may experience gradual resource leaks leading to kernel memory exhaustion. This can cause system slowdowns, crashes, or reboots, potentially disrupting critical network infrastructure or industrial control systems. While the vulnerability does not enable direct remote code execution or privilege escalation, the resulting denial of service could impact network reliability and availability of services. European enterprises relying on Linux for networking hardware, telecommunications, or industrial automation should be aware of this risk. Given the lack of known exploits, the immediate threat level is moderate, but unpatched systems could face stability issues over time, especially in environments with high network traffic or long uptimes.
Mitigation Recommendations
To mitigate CVE-2022-49367, European organizations should: 1) Identify Linux systems using the mv88e6xxx DSA driver, particularly those running kernel versions around the affected commit. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to the mv88e6xxx_mdios_register function as soon as they become available from trusted sources or Linux distributions. 3) For systems where patching the kernel is not immediately feasible, implement monitoring of kernel memory usage and system logs to detect early signs of resource leaks or instability. 4) Consider rebooting affected systems periodically as a temporary measure to clear leaked references and free kernel memory. 5) Engage with hardware vendors or Linux distribution maintainers to obtain updated kernel packages incorporating the fix. 6) Maintain a robust incident response plan to handle potential service disruptions caused by this vulnerability. These steps go beyond generic advice by focusing on identifying specific affected drivers, monitoring kernel resource usage, and coordinating with vendors for timely patching.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.555Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe57e3
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:27:51 AM
Last updated: 8/8/2025, 3:09:21 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.