CVE-2022-49468: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: thermal/core: Fix memory leak in __thermal_cooling_device_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff888010080000 (size 264312): comm "182", pid 102533, jiffies 4296434960 (age 10.100s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 7f 1f b9 ff ff ff ff ........@....... backtrace: [<0000000038b2f4fc>] kmalloc_order_trace+0x1d/0x110 mm/slab_common.c:969 [<00000000ebcb8da5>] __kmalloc+0x373/0x420 include/linux/slab.h:510 [<0000000084137f13>] thermal_cooling_device_setup_sysfs+0x15d/0x2d0 include/linux/slab.h:586 [<00000000352b8755>] __thermal_cooling_device_register+0x332/0xa60 drivers/thermal/thermal_core.c:927 [<00000000fb9f331b>] devm_thermal_of_cooling_device_register+0x6b/0xf0 drivers/thermal/thermal_core.c:1041 [<000000009b8012d2>] max6650_probe.cold+0x557/0x6aa drivers/hwmon/max6650.c:211 [<00000000da0b7e04>] i2c_device_probe+0x472/0xac0 drivers/i2c/i2c-core-base.c:561 If device_register() fails, thermal_cooling_device_destroy_sysfs() need be called to free the memory allocated in thermal_cooling_device_setup_sysfs().
AI Analysis
Technical Summary
CVE-2022-49468 is a vulnerability identified in the Linux kernel's thermal management subsystem, specifically within the thermal cooling device registration process. The issue is a memory leak occurring in the function __thermal_cooling_device_register(), which is responsible for registering thermal cooling devices. During fault injection testing, it was observed that if the device registration fails, the allocated memory in thermal_cooling_device_setup_sysfs() is not properly freed because the cleanup function thermal_cooling_device_destroy_sysfs() is not called. This results in unreferenced objects remaining in memory, leading to a leak. The backtrace provided shows the allocation path through kmalloc_order_trace and __kmalloc, indicating kernel slab allocator involvement. The problem arises when device_register() fails, and the necessary cleanup is omitted, causing the kernel to retain allocated memory unnecessarily. This vulnerability affects Linux kernel versions identified by the commit hash 8ea229511e06f9635ecc338dcbe0db41a73623f0 and potentially others in the same codebase lineage. Although no known exploits are reported in the wild, the flaw could degrade system stability over time, especially in environments with frequent thermal device registration failures or restarts. The issue is technical and low-level, impacting kernel memory management related to thermal device handling, which is critical for hardware temperature regulation and system reliability.
Potential Impact
For European organizations, the impact of CVE-2022-49468 primarily concerns system stability and reliability rather than direct compromise of confidentiality or integrity. The memory leak could lead to gradual exhaustion of kernel memory resources, potentially causing system slowdowns, crashes, or reboots if thermal devices fail to register correctly or if the system undergoes frequent thermal subsystem reinitializations. This is particularly relevant for data centers, cloud providers, and enterprises running Linux-based servers or embedded systems where uptime and hardware temperature management are critical. Industrial control systems, telecommunications infrastructure, and IoT devices using Linux kernels with affected versions could also experience degraded performance or unexpected failures. While no direct exploitation for privilege escalation or remote code execution is indicated, the indirect effects on availability could disrupt business operations and service continuity. European organizations with large-scale Linux deployments or those in sectors relying on embedded Linux devices should be aware of this vulnerability's potential to cause operational issues.
Mitigation Recommendations
To mitigate CVE-2022-49468, organizations should apply the official Linux kernel patches that fix the memory leak by ensuring thermal_cooling_device_destroy_sysfs() is called upon device registration failure. Kernel updates from trusted Linux distributions that incorporate this fix should be deployed promptly. For environments where immediate patching is not feasible, monitoring kernel logs for thermal device registration errors and memory usage trends can help detect symptoms of the leak. System administrators should also review custom kernel modules or drivers interacting with the thermal subsystem to ensure they handle error paths correctly. Implementing automated kernel update mechanisms and testing patches in staging environments before production rollout will reduce risk. Additionally, organizations should maintain robust backup and recovery procedures to mitigate potential downtime caused by system instability. For embedded or IoT devices, coordination with hardware vendors to receive updated firmware or kernel versions is essential. Finally, limiting unnecessary thermal device reinitializations and ensuring hardware compatibility can reduce the likelihood of triggering the leak.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49468: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: thermal/core: Fix memory leak in __thermal_cooling_device_register() I got memory leak as follows when doing fault injection test: unreferenced object 0xffff888010080000 (size 264312): comm "182", pid 102533, jiffies 4296434960 (age 10.100s) hex dump (first 32 bytes): 00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N.......... ff ff ff ff ff ff ff ff 40 7f 1f b9 ff ff ff ff ........@....... backtrace: [<0000000038b2f4fc>] kmalloc_order_trace+0x1d/0x110 mm/slab_common.c:969 [<00000000ebcb8da5>] __kmalloc+0x373/0x420 include/linux/slab.h:510 [<0000000084137f13>] thermal_cooling_device_setup_sysfs+0x15d/0x2d0 include/linux/slab.h:586 [<00000000352b8755>] __thermal_cooling_device_register+0x332/0xa60 drivers/thermal/thermal_core.c:927 [<00000000fb9f331b>] devm_thermal_of_cooling_device_register+0x6b/0xf0 drivers/thermal/thermal_core.c:1041 [<000000009b8012d2>] max6650_probe.cold+0x557/0x6aa drivers/hwmon/max6650.c:211 [<00000000da0b7e04>] i2c_device_probe+0x472/0xac0 drivers/i2c/i2c-core-base.c:561 If device_register() fails, thermal_cooling_device_destroy_sysfs() need be called to free the memory allocated in thermal_cooling_device_setup_sysfs().
AI-Powered Analysis
Technical Analysis
CVE-2022-49468 is a vulnerability identified in the Linux kernel's thermal management subsystem, specifically within the thermal cooling device registration process. The issue is a memory leak occurring in the function __thermal_cooling_device_register(), which is responsible for registering thermal cooling devices. During fault injection testing, it was observed that if the device registration fails, the allocated memory in thermal_cooling_device_setup_sysfs() is not properly freed because the cleanup function thermal_cooling_device_destroy_sysfs() is not called. This results in unreferenced objects remaining in memory, leading to a leak. The backtrace provided shows the allocation path through kmalloc_order_trace and __kmalloc, indicating kernel slab allocator involvement. The problem arises when device_register() fails, and the necessary cleanup is omitted, causing the kernel to retain allocated memory unnecessarily. This vulnerability affects Linux kernel versions identified by the commit hash 8ea229511e06f9635ecc338dcbe0db41a73623f0 and potentially others in the same codebase lineage. Although no known exploits are reported in the wild, the flaw could degrade system stability over time, especially in environments with frequent thermal device registration failures or restarts. The issue is technical and low-level, impacting kernel memory management related to thermal device handling, which is critical for hardware temperature regulation and system reliability.
Potential Impact
For European organizations, the impact of CVE-2022-49468 primarily concerns system stability and reliability rather than direct compromise of confidentiality or integrity. The memory leak could lead to gradual exhaustion of kernel memory resources, potentially causing system slowdowns, crashes, or reboots if thermal devices fail to register correctly or if the system undergoes frequent thermal subsystem reinitializations. This is particularly relevant for data centers, cloud providers, and enterprises running Linux-based servers or embedded systems where uptime and hardware temperature management are critical. Industrial control systems, telecommunications infrastructure, and IoT devices using Linux kernels with affected versions could also experience degraded performance or unexpected failures. While no direct exploitation for privilege escalation or remote code execution is indicated, the indirect effects on availability could disrupt business operations and service continuity. European organizations with large-scale Linux deployments or those in sectors relying on embedded Linux devices should be aware of this vulnerability's potential to cause operational issues.
Mitigation Recommendations
To mitigate CVE-2022-49468, organizations should apply the official Linux kernel patches that fix the memory leak by ensuring thermal_cooling_device_destroy_sysfs() is called upon device registration failure. Kernel updates from trusted Linux distributions that incorporate this fix should be deployed promptly. For environments where immediate patching is not feasible, monitoring kernel logs for thermal device registration errors and memory usage trends can help detect symptoms of the leak. System administrators should also review custom kernel modules or drivers interacting with the thermal subsystem to ensure they handle error paths correctly. Implementing automated kernel update mechanisms and testing patches in staging environments before production rollout will reduce risk. Additionally, organizations should maintain robust backup and recovery procedures to mitigate potential downtime caused by system instability. For embedded or IoT devices, coordination with hardware vendors to receive updated firmware or kernel versions is essential. Finally, limiting unnecessary thermal device reinitializations and ensuring hardware compatibility can reduce the likelihood of triggering the leak.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.578Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5b24
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 3:58:06 PM
Last updated: 8/14/2025, 4:30:09 PM
Views: 15
Related Threats
CVE-2025-9341: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java FIPS
MediumCVE-2025-8678: CWE-918 Server-Side Request Forgery (SSRF) in johnbillion WP Crontrol
MediumCVE-2025-57699: Unquoted search path or element in Western Digital Corporation Western Digital Kitfox for Windows
MediumCVE-2025-8281: CWE-79 Cross-Site Scripting (XSS) in WP Talroo
HighCVE-2025-41452: CWE-15: External Control of System or Configuration Setting in Danfoss AK-SM8xxA Series
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.