Skip to main content

CVE-2022-49463: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49463cvecve-2022-49463
Published: Wed Feb 26 2025 (02/26/2025, 02:13:09 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe of_find_node_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 07:40:56 UTC

Technical Analysis

CVE-2022-49463 is a vulnerability identified in the Linux kernel, specifically within the thermal driver for i.MX System Controller (imx_sc_thermal). The issue arises from a reference count leak in the function imx_sc_thermal_probe. The root cause is the improper handling of device tree node references: the function of_find_node_by_name() returns a node pointer with its reference count incremented, but the corresponding release function of_node_put() was not called after the node was no longer needed. This omission leads to a reference count leak, which means that the kernel holds onto resources longer than necessary. Over time, this can cause resource exhaustion, potentially leading to degraded system performance or instability. While this is a memory/resource management bug rather than a direct code execution or privilege escalation vulnerability, it can still impact system reliability. The vulnerability affects Linux kernel versions identified by the commit hash e20db70dba1c0783b9878ce37171ad560b1ebaf3 and similar builds. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. This vulnerability is categorized as a resource leak issue rather than a direct security breach vector, but it can be leveraged in denial-of-service scenarios if an attacker can repeatedly trigger the probe function, causing resource depletion.

Potential Impact

For European organizations, the impact of CVE-2022-49463 is primarily related to system stability and availability. Organizations running Linux-based systems with the affected kernel versions, especially those using i.MX System Controller thermal drivers (common in embedded systems, industrial control, and IoT devices), may experience resource leaks leading to performance degradation or crashes over time. This could disrupt critical infrastructure, manufacturing systems, or embedded devices used in sectors like automotive, telecommunications, or energy. Although the vulnerability does not directly expose confidentiality or integrity risks, the potential for denial-of-service through resource exhaustion could impact operational continuity. European organizations relying on embedded Linux systems in critical environments should be aware of this risk, as prolonged leaks can cause system failures, requiring reboots or maintenance, which may lead to downtime and operational costs.

Mitigation Recommendations

To mitigate CVE-2022-49463, organizations should: 1) Apply the official Linux kernel patches that include the fix for the reference count leak in the imx_sc_thermal driver as soon as they become available. 2) For embedded or industrial devices where kernel updates are slow or difficult, consider implementing monitoring for abnormal resource usage or memory leaks related to thermal drivers to detect early signs of exploitation or malfunction. 3) Limit access to systems running vulnerable kernels to trusted users and networks to reduce the risk of repeated triggering of the vulnerable code path. 4) In development or testing environments, audit custom kernel modules or device tree configurations to ensure proper reference counting and resource management practices are followed. 5) Coordinate with device vendors and suppliers to confirm that firmware or kernel updates addressing this vulnerability are included in future releases. 6) Establish incident response procedures to quickly reboot or isolate affected devices if resource exhaustion symptoms appear.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.576Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5ae1

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 7:40:56 AM

Last updated: 8/14/2025, 3:01:40 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats