Skip to main content

CVE-2022-49454: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49454cvecve-2022-49454
Published: Wed Feb 26 2025 (02/26/2025, 02:13:03 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: PCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup() The of_find_compatible_node() function returns a node pointer with refcount incremented, We should use of_node_put() on it when done Add the missing of_node_put() to release the refcount.

AI-Powered Analysis

AILast updated: 06/30/2025, 07:27:54 UTC

Technical Analysis

CVE-2022-49454 is a vulnerability identified in the Linux kernel specifically related to the PCI Mediatek subsystem. The issue arises from a refcount leak in the function mtk_pcie_subsys_powerup(). The root cause is that the function of_find_compatible_node() returns a node pointer with its reference count incremented, but the code fails to call of_node_put() to decrement the reference count once the node is no longer needed. This omission leads to a reference count leak, which can cause resource exhaustion over time. Although this vulnerability does not directly allow code execution or privilege escalation, the leak of kernel references can degrade system stability and potentially lead to denial of service (DoS) conditions if the kernel runs out of resources managing device nodes. The vulnerability affects Linux kernel versions containing the specified commit hash 87e8657ba99cac87b84c7f8ead91b44d88345504, and the issue has been addressed by adding the missing of_node_put() call to properly release the reference count. There are no known exploits in the wild at this time, and no CVSS score has been assigned. The vulnerability is technical and low-level, impacting kernel memory management related to PCI device power-up sequences on Mediatek hardware platforms.

Potential Impact

For European organizations, the impact of CVE-2022-49454 is primarily related to system stability and availability. Organizations using Linux systems with Mediatek PCI devices—common in embedded systems, IoT devices, or specialized industrial equipment—may experience gradual resource depletion leading to kernel instability or crashes. This can disrupt critical infrastructure, manufacturing systems, or telecommunications equipment that rely on stable Linux kernel operation. While the vulnerability does not directly compromise confidentiality or integrity, the potential for denial of service through resource exhaustion could affect business continuity and operational reliability. The impact is more pronounced in environments where uptime is critical and where Mediatek hardware is deployed at scale. Since no known exploits exist, the immediate risk is low, but unpatched systems remain vulnerable to future exploitation attempts or accidental system failures.

Mitigation Recommendations

To mitigate CVE-2022-49454, European organizations should prioritize updating their Linux kernel to the patched version that includes the fix for the reference count leak. This involves applying the latest stable kernel releases or vendor-provided patches that address the mtk_pcie_subsys_powerup() function. For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain firmware or kernel updates. Additionally, implement monitoring of kernel logs and system resource usage to detect early signs of resource leaks or instability related to PCI device management. Employ rigorous testing of kernel updates in staging environments before deployment to production to avoid unintended disruptions. Where immediate patching is not feasible, consider isolating affected devices or limiting their exposure to critical network segments to reduce potential impact. Regularly review and audit kernel modules and device drivers for similar resource management issues to proactively identify and remediate vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.573Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5a94

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 7:27:54 AM

Last updated: 8/6/2025, 10:20:57 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats