CVE-2022-49457: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ARM: versatile: Add missing of_node_put in dcscb_init The device_node pointer is returned by of_find_compatible_node with refcount incremented. We should use of_node_put() to avoid the refcount leak.
AI Analysis
Technical Summary
CVE-2022-49457 is a vulnerability identified in the Linux kernel specifically affecting the ARM versatile platform code. The issue arises from a missing call to of_node_put() in the dcscb_init function. The device_node pointer is obtained via the of_find_compatible_node() function, which returns a pointer with its reference count incremented. Proper reference counting requires that the caller release the reference by calling of_node_put() once the node is no longer needed. Failure to do so results in a reference count leak, which is a form of resource leak within the kernel. Over time, this leak can lead to increased memory consumption and potential resource exhaustion. While this vulnerability does not directly enable code execution or privilege escalation, it can degrade system stability and availability, particularly in embedded or ARM-based Linux systems where resources may be constrained. The vulnerability is specific to the ARM versatile platform code path in the Linux kernel and has been addressed by adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. There are no known exploits in the wild, and no CVSS score has been assigned to this vulnerability as of the published date.
Potential Impact
For European organizations, the impact of CVE-2022-49457 is primarily related to system stability and availability, especially for those deploying ARM-based Linux systems. This includes embedded devices, IoT infrastructure, and specialized ARM servers or development platforms. Organizations relying on such systems may experience gradual degradation of performance or unexpected crashes due to resource exhaustion caused by the reference count leak. While this does not directly compromise confidentiality or integrity, the availability impact could disrupt critical services or industrial control systems that use ARM Linux platforms. Given the increasing adoption of ARM architectures in edge computing and IoT deployments across Europe, the vulnerability could affect sectors such as manufacturing, telecommunications, and smart city infrastructure. However, the risk is mitigated by the fact that exploitation requires the vulnerable code path to be exercised, and no active exploits are known. The vulnerability is less relevant for x86-based Linux servers or desktops, which dominate traditional enterprise environments.
Mitigation Recommendations
European organizations should ensure that all ARM-based Linux kernel deployments are updated to include the patch that adds the missing of_node_put() call in dcscb_init. This involves applying the latest Linux kernel updates from trusted sources or vendor-provided patches for embedded devices. For organizations managing embedded or IoT devices, it is critical to verify the kernel version and platform code to confirm the presence of the fix. Additionally, implement monitoring for unusual memory usage or kernel resource leaks on ARM devices to detect potential exploitation or system degradation early. Where possible, restrict access to ARM Linux devices to trusted users and networks to reduce the risk of triggering the vulnerable code path. For development and testing environments, incorporate static code analysis and kernel auditing tools to identify similar reference counting issues proactively. Finally, maintain an inventory of ARM-based Linux systems to prioritize patching and risk assessment efforts effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-49457: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ARM: versatile: Add missing of_node_put in dcscb_init The device_node pointer is returned by of_find_compatible_node with refcount incremented. We should use of_node_put() to avoid the refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49457 is a vulnerability identified in the Linux kernel specifically affecting the ARM versatile platform code. The issue arises from a missing call to of_node_put() in the dcscb_init function. The device_node pointer is obtained via the of_find_compatible_node() function, which returns a pointer with its reference count incremented. Proper reference counting requires that the caller release the reference by calling of_node_put() once the node is no longer needed. Failure to do so results in a reference count leak, which is a form of resource leak within the kernel. Over time, this leak can lead to increased memory consumption and potential resource exhaustion. While this vulnerability does not directly enable code execution or privilege escalation, it can degrade system stability and availability, particularly in embedded or ARM-based Linux systems where resources may be constrained. The vulnerability is specific to the ARM versatile platform code path in the Linux kernel and has been addressed by adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. There are no known exploits in the wild, and no CVSS score has been assigned to this vulnerability as of the published date.
Potential Impact
For European organizations, the impact of CVE-2022-49457 is primarily related to system stability and availability, especially for those deploying ARM-based Linux systems. This includes embedded devices, IoT infrastructure, and specialized ARM servers or development platforms. Organizations relying on such systems may experience gradual degradation of performance or unexpected crashes due to resource exhaustion caused by the reference count leak. While this does not directly compromise confidentiality or integrity, the availability impact could disrupt critical services or industrial control systems that use ARM Linux platforms. Given the increasing adoption of ARM architectures in edge computing and IoT deployments across Europe, the vulnerability could affect sectors such as manufacturing, telecommunications, and smart city infrastructure. However, the risk is mitigated by the fact that exploitation requires the vulnerable code path to be exercised, and no active exploits are known. The vulnerability is less relevant for x86-based Linux servers or desktops, which dominate traditional enterprise environments.
Mitigation Recommendations
European organizations should ensure that all ARM-based Linux kernel deployments are updated to include the patch that adds the missing of_node_put() call in dcscb_init. This involves applying the latest Linux kernel updates from trusted sources or vendor-provided patches for embedded devices. For organizations managing embedded or IoT devices, it is critical to verify the kernel version and platform code to confirm the presence of the fix. Additionally, implement monitoring for unusual memory usage or kernel resource leaks on ARM devices to detect potential exploitation or system degradation early. Where possible, restrict access to ARM Linux devices to trusted users and networks to reduce the risk of triggering the vulnerable code path. For development and testing environments, incorporate static code analysis and kernel auditing tools to identify similar reference counting issues proactively. Finally, maintain an inventory of ARM-based Linux systems to prioritize patching and risk assessment efforts effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.574Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5aac
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 7:28:37 AM
Last updated: 8/15/2025, 7:32:41 AM
Views: 27
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.