CVE-2022-49373: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() in some error paths.
AI Analysis
Technical Summary
CVE-2022-49373 is a vulnerability identified in the Linux kernel's watchdog driver for the TS-4800 platform (ts4800_wdt). The issue arises from a reference count leak in the ts4800_wdt_probe function. Specifically, the function of_parse_phandle() returns a device tree node pointer with its reference count incremented, but the code fails to properly decrement this reference count using of_node_put() in certain error handling paths. This omission leads to a resource leak where the reference count on the node is not released, potentially causing resource exhaustion or instability in the kernel watchdog subsystem. The vulnerability is rooted in improper management of kernel object lifetimes, which can degrade system reliability over time. While this is not a direct code execution or privilege escalation vulnerability, the leak could contribute to system instability or denial of service conditions if the watchdog driver is repeatedly probed or fails to release resources correctly. The vulnerability affects specific versions of the Linux kernel identified by the commit hash bf9006399939762e6cd32445e848e56727df9d98. The issue has been resolved by adding the missing of_node_put() calls in the error paths to ensure proper decrementing of the reference count. There are no known exploits in the wild at this time, and no CVSS score has been assigned to this vulnerability. The fix is a typical kernel resource management correction, important for maintaining system stability especially in embedded or specialized hardware environments using the TS-4800 watchdog driver.
Potential Impact
For European organizations, the impact of CVE-2022-49373 is primarily related to system stability and reliability rather than direct compromise. Organizations running Linux kernels with the affected ts4800_wdt driver, particularly on TS-4800 hardware or similar embedded systems, may experience resource leaks leading to degraded watchdog functionality. This could result in watchdog failures that impair system monitoring and recovery capabilities, potentially causing longer downtimes or failure to detect system hangs. Critical infrastructure, industrial control systems, or embedded devices relying on this hardware and driver could be affected, impacting operational continuity. However, since there is no indication of privilege escalation or remote code execution, the confidentiality and integrity of data are unlikely to be directly impacted. The threat is more relevant for environments where system uptime and hardware watchdog reliability are critical, such as telecommunications, manufacturing, or transportation sectors prevalent in Europe. Given the absence of known exploits, the immediate risk is low but should not be ignored in environments using the affected hardware and kernel versions.
Mitigation Recommendations
To mitigate CVE-2022-49373, European organizations should: 1) Identify systems running the affected Linux kernel versions with the ts4800_wdt watchdog driver, especially embedded or specialized hardware using the TS-4800 platform. 2) Apply the official Linux kernel patches that add the missing of_node_put() calls to ensure proper reference count management. If using vendor-specific kernel builds, coordinate with hardware or OS vendors to obtain updated kernel versions. 3) Implement monitoring for watchdog subsystem errors or resource leaks that could indicate the vulnerability's effects. 4) For embedded or industrial systems where kernel updates are challenging, consider workarounds such as disabling the ts4800_wdt driver if not critical, or isolating affected devices to reduce operational impact. 5) Maintain regular kernel updates and vulnerability management processes to promptly address similar resource management issues. 6) Conduct thorough testing of updated kernels in staging environments before deployment to avoid regressions in critical systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden
CVE-2022-49373: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() in some error paths.
AI-Powered Analysis
Technical Analysis
CVE-2022-49373 is a vulnerability identified in the Linux kernel's watchdog driver for the TS-4800 platform (ts4800_wdt). The issue arises from a reference count leak in the ts4800_wdt_probe function. Specifically, the function of_parse_phandle() returns a device tree node pointer with its reference count incremented, but the code fails to properly decrement this reference count using of_node_put() in certain error handling paths. This omission leads to a resource leak where the reference count on the node is not released, potentially causing resource exhaustion or instability in the kernel watchdog subsystem. The vulnerability is rooted in improper management of kernel object lifetimes, which can degrade system reliability over time. While this is not a direct code execution or privilege escalation vulnerability, the leak could contribute to system instability or denial of service conditions if the watchdog driver is repeatedly probed or fails to release resources correctly. The vulnerability affects specific versions of the Linux kernel identified by the commit hash bf9006399939762e6cd32445e848e56727df9d98. The issue has been resolved by adding the missing of_node_put() calls in the error paths to ensure proper decrementing of the reference count. There are no known exploits in the wild at this time, and no CVSS score has been assigned to this vulnerability. The fix is a typical kernel resource management correction, important for maintaining system stability especially in embedded or specialized hardware environments using the TS-4800 watchdog driver.
Potential Impact
For European organizations, the impact of CVE-2022-49373 is primarily related to system stability and reliability rather than direct compromise. Organizations running Linux kernels with the affected ts4800_wdt driver, particularly on TS-4800 hardware or similar embedded systems, may experience resource leaks leading to degraded watchdog functionality. This could result in watchdog failures that impair system monitoring and recovery capabilities, potentially causing longer downtimes or failure to detect system hangs. Critical infrastructure, industrial control systems, or embedded devices relying on this hardware and driver could be affected, impacting operational continuity. However, since there is no indication of privilege escalation or remote code execution, the confidentiality and integrity of data are unlikely to be directly impacted. The threat is more relevant for environments where system uptime and hardware watchdog reliability are critical, such as telecommunications, manufacturing, or transportation sectors prevalent in Europe. Given the absence of known exploits, the immediate risk is low but should not be ignored in environments using the affected hardware and kernel versions.
Mitigation Recommendations
To mitigate CVE-2022-49373, European organizations should: 1) Identify systems running the affected Linux kernel versions with the ts4800_wdt watchdog driver, especially embedded or specialized hardware using the TS-4800 platform. 2) Apply the official Linux kernel patches that add the missing of_node_put() calls to ensure proper reference count management. If using vendor-specific kernel builds, coordinate with hardware or OS vendors to obtain updated kernel versions. 3) Implement monitoring for watchdog subsystem errors or resource leaks that could indicate the vulnerability's effects. 4) For embedded or industrial systems where kernel updates are challenging, consider workarounds such as disabling the ts4800_wdt driver if not critical, or isolating affected devices to reduce operational impact. 5) Maintain regular kernel updates and vulnerability management processes to promptly address similar resource management issues. 6) Conduct thorough testing of updated kernels in staging environments before deployment to avoid regressions in critical systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.556Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5821
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:29:21 AM
Last updated: 8/11/2025, 6:12:24 AM
Views: 12
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.