Skip to main content

CVE-2022-49373: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49373cvecve-2022-49373
Published: Wed Feb 26 2025 (02/26/2025, 02:11:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() in some error paths.

AI-Powered Analysis

AILast updated: 06/30/2025, 06:29:21 UTC

Technical Analysis

CVE-2022-49373 is a vulnerability identified in the Linux kernel's watchdog driver for the TS-4800 platform (ts4800_wdt). The issue arises from a reference count leak in the ts4800_wdt_probe function. Specifically, the function of_parse_phandle() returns a device tree node pointer with its reference count incremented, but the code fails to properly decrement this reference count using of_node_put() in certain error handling paths. This omission leads to a resource leak where the reference count on the node is not released, potentially causing resource exhaustion or instability in the kernel watchdog subsystem. The vulnerability is rooted in improper management of kernel object lifetimes, which can degrade system reliability over time. While this is not a direct code execution or privilege escalation vulnerability, the leak could contribute to system instability or denial of service conditions if the watchdog driver is repeatedly probed or fails to release resources correctly. The vulnerability affects specific versions of the Linux kernel identified by the commit hash bf9006399939762e6cd32445e848e56727df9d98. The issue has been resolved by adding the missing of_node_put() calls in the error paths to ensure proper decrementing of the reference count. There are no known exploits in the wild at this time, and no CVSS score has been assigned to this vulnerability. The fix is a typical kernel resource management correction, important for maintaining system stability especially in embedded or specialized hardware environments using the TS-4800 watchdog driver.

Potential Impact

For European organizations, the impact of CVE-2022-49373 is primarily related to system stability and reliability rather than direct compromise. Organizations running Linux kernels with the affected ts4800_wdt driver, particularly on TS-4800 hardware or similar embedded systems, may experience resource leaks leading to degraded watchdog functionality. This could result in watchdog failures that impair system monitoring and recovery capabilities, potentially causing longer downtimes or failure to detect system hangs. Critical infrastructure, industrial control systems, or embedded devices relying on this hardware and driver could be affected, impacting operational continuity. However, since there is no indication of privilege escalation or remote code execution, the confidentiality and integrity of data are unlikely to be directly impacted. The threat is more relevant for environments where system uptime and hardware watchdog reliability are critical, such as telecommunications, manufacturing, or transportation sectors prevalent in Europe. Given the absence of known exploits, the immediate risk is low but should not be ignored in environments using the affected hardware and kernel versions.

Mitigation Recommendations

To mitigate CVE-2022-49373, European organizations should: 1) Identify systems running the affected Linux kernel versions with the ts4800_wdt watchdog driver, especially embedded or specialized hardware using the TS-4800 platform. 2) Apply the official Linux kernel patches that add the missing of_node_put() calls to ensure proper reference count management. If using vendor-specific kernel builds, coordinate with hardware or OS vendors to obtain updated kernel versions. 3) Implement monitoring for watchdog subsystem errors or resource leaks that could indicate the vulnerability's effects. 4) For embedded or industrial systems where kernel updates are challenging, consider workarounds such as disabling the ts4800_wdt driver if not critical, or isolating affected devices to reduce operational impact. 5) Maintain regular kernel updates and vulnerability management processes to promptly address similar resource management issues. 6) Conduct thorough testing of updated kernels in staging environments before deployment to avoid regressions in critical systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.556Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5821

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:29:21 AM

Last updated: 8/11/2025, 6:12:24 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats