Skip to main content

CVE-2022-49466: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49466cvecve-2022-49466
Published: Wed Feb 26 2025 (02/26/2025, 02:13:11 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: regulator: scmi: Fix refcount leak in scmi_regulator_probe of_find_node_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 15:56:51 UTC

Technical Analysis

CVE-2022-49466 is a vulnerability identified in the Linux kernel's regulator subsystem, specifically within the SCMI (System Control and Management Interface) regulator probe function. The issue arises due to a reference count leak caused by improper handling of device tree node pointers. The function of_find_node_by_name() returns a node pointer with its reference count incremented, which requires a corresponding call to of_node_put() to decrement the reference count once the node is no longer needed. The vulnerability occurs because the Linux kernel code omitted this necessary call to of_node_put(), leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel due to unreleased references to device tree nodes. While this is a memory management flaw rather than a direct code execution or privilege escalation vulnerability, it can degrade system stability and reliability. The vulnerability affects the Linux kernel versions identified by the commit hash 0fbeae70ee7ce98e18a47337cd1f205dd88589e9, indicating a specific patch or kernel version lineage. There are no known exploits in the wild for this vulnerability, and no CVSS score has been assigned yet. The fix involves adding the missing of_node_put() call to properly release the node reference and prevent the leak. This vulnerability is a subtle kernel resource management bug that could impact long-running systems or embedded devices relying on the SCMI regulator interface, potentially leading to kernel memory leaks and degraded system performance or stability over time.

Potential Impact

For European organizations, the impact of CVE-2022-49466 is primarily related to system stability and reliability rather than immediate security compromise. Organizations running Linux-based infrastructure, especially those using kernels with the affected SCMI regulator code, may experience gradual resource exhaustion due to the reference count leak. This can lead to degraded performance, increased system crashes, or kernel panics in critical systems, particularly in embedded or industrial environments where uptime is crucial. Data centers, telecommunications providers, and industries relying on embedded Linux devices (such as automotive, manufacturing, or IoT deployments) could be affected if they use vulnerable kernel versions. Although this vulnerability does not directly expose confidentiality or integrity risks, the availability and operational continuity of affected systems could be compromised if the leak leads to kernel instability. European organizations with critical infrastructure or industrial control systems running Linux kernels with SCMI support should be aware of this issue to avoid unexpected downtime or maintenance overhead.

Mitigation Recommendations

To mitigate CVE-2022-49466, European organizations should: 1) Identify Linux systems running kernel versions that include the vulnerable SCMI regulator code, particularly those matching the commit hash or kernel versions released around the vulnerability disclosure date. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. This may require updating to a newer kernel version or backporting the patch for long-term support kernels. 3) For embedded or specialized devices where kernel updates are challenging, coordinate with device vendors or maintainers to obtain patched firmware or kernel images. 4) Monitor system logs and kernel metrics for signs of resource leaks or instability related to device tree node references, especially on systems with long uptimes. 5) Implement proactive system restarts or resource monitoring as a temporary workaround if patching is delayed, to prevent resource exhaustion from accumulating. 6) Maintain an inventory of Linux kernel versions deployed across infrastructure to facilitate rapid vulnerability assessment and patch management. These steps go beyond generic advice by focusing on kernel version identification, vendor coordination for embedded devices, and operational monitoring specific to reference count leaks in the SCMI regulator subsystem.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.577Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5b14

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 3:56:51 PM

Last updated: 8/2/2025, 6:13:24 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats