CVE-2022-49415: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ipmi:ipmb: Fix refcount leak in ipmi_ipmb_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.
AI Analysis
Technical Summary
CVE-2022-49415 is a vulnerability identified in the Linux kernel, specifically within the IPMI (Intelligent Platform Management Interface) subsystem's IPMB (Intelligent Platform Management Bus) driver. The issue arises from a reference count leak in the function ipmi_ipmb_probe. The root cause is related to the improper handling of device tree node pointers returned by the function of_parse_phandle(). This function returns a node pointer with an incremented reference count, and the Linux kernel code failed to call of_node_put() to decrement the reference count after usage, leading to a leak. Over time, this leak can cause resource exhaustion in the kernel due to unreleased references, potentially degrading system stability or causing denial of service conditions. The vulnerability does not appear to have any known exploits in the wild and affects specific Linux kernel versions identified by the commit hash 00d93611f00219bd142aa119c5121793cac30ff0. The fix involves adding the missing of_node_put() call to properly release the node reference and prevent the leak. Since this vulnerability is in the kernel's IPMI subsystem, it primarily affects systems using IPMI for out-of-band management, which is common in server environments and embedded systems. The vulnerability does not directly enable privilege escalation or remote code execution but can impact system availability through resource leaks if exploited or triggered repeatedly.
Potential Impact
For European organizations, the impact of CVE-2022-49415 is primarily related to system stability and availability, especially in data centers and enterprise environments that rely on Linux servers with IPMI-based management. Resource leaks in the kernel can lead to gradual degradation of system performance or unexpected crashes, potentially causing downtime for critical infrastructure. This is particularly relevant for industries with high availability requirements such as finance, telecommunications, healthcare, and government services. While the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service or system instability could disrupt business operations and service delivery. Organizations using Linux distributions with affected kernel versions in their server or embedded device fleets should be aware of this risk. The lack of known exploits reduces immediate threat levels, but the vulnerability should be addressed proactively to prevent potential exploitation or accidental triggering in operational environments.
Mitigation Recommendations
To mitigate CVE-2022-49415, European organizations should: 1) Identify Linux systems running affected kernel versions, particularly those utilizing IPMI for hardware management. 2) Apply the official Linux kernel patches or updates that include the fix for the reference count leak as soon as they become available from trusted Linux distribution vendors or the upstream Linux kernel. 3) Monitor system logs and resource usage metrics for signs of resource exhaustion or abnormal behavior related to IPMI or kernel memory usage. 4) Limit access to IPMI interfaces to trusted administrators and networks to reduce the risk of accidental or malicious triggering of the vulnerability. 5) Incorporate this vulnerability into regular patch management and vulnerability scanning processes to ensure timely remediation. 6) For environments where patching is delayed, consider temporary mitigations such as disabling IPMI if feasible or isolating affected systems to minimize impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49415: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ipmi:ipmb: Fix refcount leak in ipmi_ipmb_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49415 is a vulnerability identified in the Linux kernel, specifically within the IPMI (Intelligent Platform Management Interface) subsystem's IPMB (Intelligent Platform Management Bus) driver. The issue arises from a reference count leak in the function ipmi_ipmb_probe. The root cause is related to the improper handling of device tree node pointers returned by the function of_parse_phandle(). This function returns a node pointer with an incremented reference count, and the Linux kernel code failed to call of_node_put() to decrement the reference count after usage, leading to a leak. Over time, this leak can cause resource exhaustion in the kernel due to unreleased references, potentially degrading system stability or causing denial of service conditions. The vulnerability does not appear to have any known exploits in the wild and affects specific Linux kernel versions identified by the commit hash 00d93611f00219bd142aa119c5121793cac30ff0. The fix involves adding the missing of_node_put() call to properly release the node reference and prevent the leak. Since this vulnerability is in the kernel's IPMI subsystem, it primarily affects systems using IPMI for out-of-band management, which is common in server environments and embedded systems. The vulnerability does not directly enable privilege escalation or remote code execution but can impact system availability through resource leaks if exploited or triggered repeatedly.
Potential Impact
For European organizations, the impact of CVE-2022-49415 is primarily related to system stability and availability, especially in data centers and enterprise environments that rely on Linux servers with IPMI-based management. Resource leaks in the kernel can lead to gradual degradation of system performance or unexpected crashes, potentially causing downtime for critical infrastructure. This is particularly relevant for industries with high availability requirements such as finance, telecommunications, healthcare, and government services. While the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service or system instability could disrupt business operations and service delivery. Organizations using Linux distributions with affected kernel versions in their server or embedded device fleets should be aware of this risk. The lack of known exploits reduces immediate threat levels, but the vulnerability should be addressed proactively to prevent potential exploitation or accidental triggering in operational environments.
Mitigation Recommendations
To mitigate CVE-2022-49415, European organizations should: 1) Identify Linux systems running affected kernel versions, particularly those utilizing IPMI for hardware management. 2) Apply the official Linux kernel patches or updates that include the fix for the reference count leak as soon as they become available from trusted Linux distribution vendors or the upstream Linux kernel. 3) Monitor system logs and resource usage metrics for signs of resource exhaustion or abnormal behavior related to IPMI or kernel memory usage. 4) Limit access to IPMI interfaces to trusted administrators and networks to reduce the risk of accidental or malicious triggering of the vulnerability. 5) Incorporate this vulnerability into regular patch management and vulnerability scanning processes to ensure timely remediation. 6) For environments where patching is delayed, consider temporary mitigations such as disabling IPMI if feasible or isolating affected systems to minimize impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.568Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe5960
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 6:57:31 AM
Last updated: 8/3/2025, 2:23:08 AM
Views: 12
Related Threats
CVE-2025-8817: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8820: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8819: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8818: OS Command Injection in Linksys RE6250
MediumCVE-2025-8816: Stack-based Buffer Overflow in Linksys RE6250
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.