Skip to main content

CVE-2022-49678: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49678cvecve-2022-49678
Published: Wed Feb 26 2025 (02/26/2025, 02:24:08 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak. In brcmstb_init_sram, it pass dn to of_address_to_resource(), of_address_to_resource() will call of_find_device_by_node() to take reference, so we should release the reference returned by of_find_matching_node().

AI-Powered Analysis

AILast updated: 06/30/2025, 00:10:12 UTC

Technical Analysis

CVE-2022-49678 is a vulnerability identified in the Linux kernel specifically affecting the Broadcom STB (brcmstb) platform's power management (pm) subsystem. The issue arises from a reference count leak in the brcmstb_pm_probe function. The root cause is improper handling of device tree node references: the function of_find_matching_node() increments the reference count of a device tree node pointer it returns, but the corresponding release function of_node_put() was missing in the affected code paths. This omission leads to a reference count leak. Additionally, in the brcmstb_init_sram function, a device node pointer (dn) is passed to of_address_to_resource(), which internally calls of_find_device_by_node() and takes a reference. However, the reference returned by of_find_matching_node() was not properly released, compounding the leak. The vulnerability is essentially a resource management bug that can cause the kernel to hold onto device tree node references longer than necessary, potentially leading to memory leaks or resource exhaustion over time. While this does not directly allow code execution or privilege escalation, it can degrade system stability and reliability, especially on devices using the affected Broadcom STB platform code within the Linux kernel. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves adding the missing of_node_put() calls to properly release node references and prevent the leak.

Potential Impact

For European organizations, the impact of CVE-2022-49678 is primarily related to system stability and resource management on Linux-based devices using the Broadcom STB platform code. This vulnerability could lead to memory leaks that degrade device performance or cause unexpected crashes or reboots over time. Organizations relying on embedded Linux systems, network appliances, or specialized hardware running affected kernel versions might experience reduced availability or increased maintenance overhead. Although this vulnerability does not directly compromise confidentiality or integrity, the availability impact could affect critical infrastructure or services if such devices are part of operational technology or network infrastructure. The lack of known exploits and the nature of the bug suggest a lower immediate risk, but unpatched systems could face reliability issues, especially in large-scale deployments or environments with constrained resources.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Apply the official Linux kernel patches that add the missing of_node_put() calls to the brcmstb_pm_probe and related functions as soon as they are available from trusted sources or Linux distributions. 2) Identify and inventory devices running affected Linux kernel versions with Broadcom STB platform code, prioritizing those in critical roles or with limited resources. 3) Monitor system logs and resource usage metrics for signs of memory leaks or abnormal behavior that could indicate the vulnerability's effects. 4) Where possible, update to newer kernel versions or vendor firmware releases that incorporate the fix. 5) For embedded or specialized devices where patching is delayed, consider implementing system restarts or resource cleanup procedures to mitigate long-term resource exhaustion. 6) Engage with hardware and software vendors to confirm patch availability and deployment timelines. These steps go beyond generic advice by focusing on targeted patching, monitoring, and operational controls specific to the affected platform and vulnerability type.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.438Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe47f4

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 12:10:12 AM

Last updated: 8/5/2025, 12:55:15 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats