Skip to main content

CVE-2022-49415: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49415cvecve-2022-49415
Published: Wed Feb 26 2025 (02/26/2025, 02:12:35 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ipmi:ipmb: Fix refcount leak in ipmi_ipmb_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 06:57:31 UTC

Technical Analysis

CVE-2022-49415 is a vulnerability identified in the Linux kernel, specifically within the IPMI (Intelligent Platform Management Interface) subsystem's IPMB (Intelligent Platform Management Bus) driver. The issue arises from a reference count leak in the function ipmi_ipmb_probe. The root cause is related to the improper handling of device tree node pointers returned by the function of_parse_phandle(). This function returns a node pointer with an incremented reference count, and the Linux kernel code failed to call of_node_put() to decrement the reference count after usage, leading to a leak. Over time, this leak can cause resource exhaustion in the kernel due to unreleased references, potentially degrading system stability or causing denial of service conditions. The vulnerability does not appear to have any known exploits in the wild and affects specific Linux kernel versions identified by the commit hash 00d93611f00219bd142aa119c5121793cac30ff0. The fix involves adding the missing of_node_put() call to properly release the node reference and prevent the leak. Since this vulnerability is in the kernel's IPMI subsystem, it primarily affects systems using IPMI for out-of-band management, which is common in server environments and embedded systems. The vulnerability does not directly enable privilege escalation or remote code execution but can impact system availability through resource leaks if exploited or triggered repeatedly.

Potential Impact

For European organizations, the impact of CVE-2022-49415 is primarily related to system stability and availability, especially in data centers and enterprise environments that rely on Linux servers with IPMI-based management. Resource leaks in the kernel can lead to gradual degradation of system performance or unexpected crashes, potentially causing downtime for critical infrastructure. This is particularly relevant for industries with high availability requirements such as finance, telecommunications, healthcare, and government services. While the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service or system instability could disrupt business operations and service delivery. Organizations using Linux distributions with affected kernel versions in their server or embedded device fleets should be aware of this risk. The lack of known exploits reduces immediate threat levels, but the vulnerability should be addressed proactively to prevent potential exploitation or accidental triggering in operational environments.

Mitigation Recommendations

To mitigate CVE-2022-49415, European organizations should: 1) Identify Linux systems running affected kernel versions, particularly those utilizing IPMI for hardware management. 2) Apply the official Linux kernel patches or updates that include the fix for the reference count leak as soon as they become available from trusted Linux distribution vendors or the upstream Linux kernel. 3) Monitor system logs and resource usage metrics for signs of resource exhaustion or abnormal behavior related to IPMI or kernel memory usage. 4) Limit access to IPMI interfaces to trusted administrators and networks to reduce the risk of accidental or malicious triggering of the vulnerability. 5) Incorporate this vulnerability into regular patch management and vulnerability scanning processes to ensure timely remediation. 6) For environments where patching is delayed, consider temporary mitigations such as disabling IPMI if feasible or isolating affected systems to minimize impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.568Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe5960

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 6:57:31 AM

Last updated: 8/3/2025, 2:23:08 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats