Skip to main content

CVE-2022-49382: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49382cvecve-2022-49382
Published: Wed Feb 26 2025 (02/26/2025, 02:11:19 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: soc: rockchip: Fix refcount leak in rockchip_grf_init of_find_matching_node_and_match returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 06:41:12 UTC

Technical Analysis

CVE-2022-49382 is a vulnerability identified in the Linux kernel specifically related to the Rockchip General Register Files (GRF) initialization code within the soc: rockchip subsystem. The issue arises from a reference count leak due to improper handling of device tree node pointers. The function of_find_matching_node_and_match returns a node pointer with its reference count incremented, which must be decremented by calling of_node_put() once the node is no longer needed. The vulnerability occurs because the Linux kernel code failed to call of_node_put(), leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to degraded system performance or instability. The flaw is a memory management bug rather than a direct code execution or privilege escalation vulnerability. It affects Linux kernel versions identified by the commit hash 4c58063d4258f6beb4fd5647db6b58f49e337c8f, which corresponds to a specific patch or kernel version. No known exploits are reported in the wild, and no CVSS score has been assigned. The root cause is a missing cleanup call in the device tree node management, which is critical for embedded systems using Rockchip SOCs, commonly found in ARM-based devices. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak.

Potential Impact

For European organizations, the impact of CVE-2022-49382 is generally limited but should not be ignored, especially for those using embedded Linux systems based on Rockchip SOCs. These SOCs are prevalent in various IoT devices, industrial control systems, and consumer electronics. The reference count leak can lead to kernel memory resource exhaustion, which may cause system instability, crashes, or denial of service conditions over prolonged operation. This can disrupt critical services or manufacturing processes relying on affected devices. However, since the vulnerability does not allow privilege escalation or remote code execution, the confidentiality and integrity of data are not directly at risk. The availability impact is moderate and depends on the workload and uptime of the affected devices. Organizations with embedded Linux devices in operational technology (OT) environments or edge computing infrastructure should be particularly vigilant. The absence of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks aiming to degrade system reliability.

Mitigation Recommendations

To mitigate CVE-2022-49382, organizations should: 1) Apply the official Linux kernel patches that include the fix for the reference count leak in the rockchip_grf_init code as soon as they are available. 2) For embedded device manufacturers or integrators, ensure that the Linux kernel version used in device firmware includes this fix before deployment. 3) Monitor system logs and kernel metrics for signs of resource leaks or instability that could indicate the presence of this issue. 4) Implement robust device lifecycle management to allow timely updates and patching of embedded Linux devices in the field. 5) For critical infrastructure using Rockchip-based devices, consider network segmentation and access controls to limit exposure and reduce the risk of exploitation attempts. 6) Engage with device vendors to confirm patch status and request updates if necessary. 7) Conduct regular firmware audits and vulnerability assessments on embedded systems to detect outdated kernels and known vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.559Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5878

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:41:12 AM

Last updated: 7/28/2025, 9:08:21 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats