CVE-2022-49678: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak. In brcmstb_init_sram, it pass dn to of_address_to_resource(), of_address_to_resource() will call of_find_device_by_node() to take reference, so we should release the reference returned by of_find_matching_node().
AI Analysis
Technical Summary
CVE-2022-49678 is a vulnerability identified in the Linux kernel specifically affecting the Broadcom STB (brcmstb) platform's power management (pm) subsystem. The issue arises from a reference count leak in the brcmstb_pm_probe function. The root cause is improper handling of device tree node references: the function of_find_matching_node() increments the reference count of a device tree node pointer it returns, but the corresponding release function of_node_put() was missing in the affected code paths. This omission leads to a reference count leak. Additionally, in the brcmstb_init_sram function, a device node pointer (dn) is passed to of_address_to_resource(), which internally calls of_find_device_by_node() and takes a reference. However, the reference returned by of_find_matching_node() was not properly released, compounding the leak. The vulnerability is essentially a resource management bug that can cause the kernel to hold onto device tree node references longer than necessary, potentially leading to memory leaks or resource exhaustion over time. While this does not directly allow code execution or privilege escalation, it can degrade system stability and reliability, especially on devices using the affected Broadcom STB platform code within the Linux kernel. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves adding the missing of_node_put() calls to properly release node references and prevent the leak.
Potential Impact
For European organizations, the impact of CVE-2022-49678 is primarily related to system stability and resource management on Linux-based devices using the Broadcom STB platform code. This vulnerability could lead to memory leaks that degrade device performance or cause unexpected crashes or reboots over time. Organizations relying on embedded Linux systems, network appliances, or specialized hardware running affected kernel versions might experience reduced availability or increased maintenance overhead. Although this vulnerability does not directly compromise confidentiality or integrity, the availability impact could affect critical infrastructure or services if such devices are part of operational technology or network infrastructure. The lack of known exploits and the nature of the bug suggest a lower immediate risk, but unpatched systems could face reliability issues, especially in large-scale deployments or environments with constrained resources.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Apply the official Linux kernel patches that add the missing of_node_put() calls to the brcmstb_pm_probe and related functions as soon as they are available from trusted sources or Linux distributions. 2) Identify and inventory devices running affected Linux kernel versions with Broadcom STB platform code, prioritizing those in critical roles or with limited resources. 3) Monitor system logs and resource usage metrics for signs of memory leaks or abnormal behavior that could indicate the vulnerability's effects. 4) Where possible, update to newer kernel versions or vendor firmware releases that incorporate the fix. 5) For embedded or specialized devices where patching is delayed, consider implementing system restarts or resource cleanup procedures to mitigate long-term resource exhaustion. 6) Engage with hardware and software vendors to confirm patch availability and deployment timelines. These steps go beyond generic advice by focusing on targeted patching, monitoring, and operational controls specific to the affected platform and vulnerability type.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2022-49678: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe of_find_matching_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak. In brcmstb_init_sram, it pass dn to of_address_to_resource(), of_address_to_resource() will call of_find_device_by_node() to take reference, so we should release the reference returned by of_find_matching_node().
AI-Powered Analysis
Technical Analysis
CVE-2022-49678 is a vulnerability identified in the Linux kernel specifically affecting the Broadcom STB (brcmstb) platform's power management (pm) subsystem. The issue arises from a reference count leak in the brcmstb_pm_probe function. The root cause is improper handling of device tree node references: the function of_find_matching_node() increments the reference count of a device tree node pointer it returns, but the corresponding release function of_node_put() was missing in the affected code paths. This omission leads to a reference count leak. Additionally, in the brcmstb_init_sram function, a device node pointer (dn) is passed to of_address_to_resource(), which internally calls of_find_device_by_node() and takes a reference. However, the reference returned by of_find_matching_node() was not properly released, compounding the leak. The vulnerability is essentially a resource management bug that can cause the kernel to hold onto device tree node references longer than necessary, potentially leading to memory leaks or resource exhaustion over time. While this does not directly allow code execution or privilege escalation, it can degrade system stability and reliability, especially on devices using the affected Broadcom STB platform code within the Linux kernel. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves adding the missing of_node_put() calls to properly release node references and prevent the leak.
Potential Impact
For European organizations, the impact of CVE-2022-49678 is primarily related to system stability and resource management on Linux-based devices using the Broadcom STB platform code. This vulnerability could lead to memory leaks that degrade device performance or cause unexpected crashes or reboots over time. Organizations relying on embedded Linux systems, network appliances, or specialized hardware running affected kernel versions might experience reduced availability or increased maintenance overhead. Although this vulnerability does not directly compromise confidentiality or integrity, the availability impact could affect critical infrastructure or services if such devices are part of operational technology or network infrastructure. The lack of known exploits and the nature of the bug suggest a lower immediate risk, but unpatched systems could face reliability issues, especially in large-scale deployments or environments with constrained resources.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Apply the official Linux kernel patches that add the missing of_node_put() calls to the brcmstb_pm_probe and related functions as soon as they are available from trusted sources or Linux distributions. 2) Identify and inventory devices running affected Linux kernel versions with Broadcom STB platform code, prioritizing those in critical roles or with limited resources. 3) Monitor system logs and resource usage metrics for signs of memory leaks or abnormal behavior that could indicate the vulnerability's effects. 4) Where possible, update to newer kernel versions or vendor firmware releases that incorporate the fix. 5) For embedded or specialized devices where patching is delayed, consider implementing system restarts or resource cleanup procedures to mitigate long-term resource exhaustion. 6) Engage with hardware and software vendors to confirm patch availability and deployment timelines. These steps go beyond generic advice by focusing on targeted patching, monitoring, and operational controls specific to the affected platform and vulnerability type.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.438Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe47f4
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:10:12 AM
Last updated: 8/5/2025, 12:55:15 PM
Views: 12
Related Threats
CVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighCVE-2025-54474: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dj-extensions.com DJ-Classifieds component for Joomla
HighCVE-2025-54473: CWE-434 Unrestricted Upload of File with Dangerous Type in phoca.cz phoca.cz - Phoca Commander for Joomla
CriticalCVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.