CVE-2024-46767: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net: phy: Fix missing of_node_put() for leds The call of of_get_child_by_name() will cause refcount incremented for leds, if it succeeds, it should call of_node_put() to decrease it, fix it.
AI Analysis
Technical Summary
CVE-2024-46767 is a vulnerability identified in the Linux kernel's networking PHY (physical layer) subsystem, specifically related to the handling of device tree nodes for LEDs. The issue arises from improper reference count management when the kernel function of_get_child_by_name() is called to retrieve a child node named 'leds'. This function increments the reference count of the device tree node it returns, and if successful, the caller is responsible for decrementing this count by calling of_node_put(). The vulnerability is due to a missing call to of_node_put(), which leads to a reference count leak. Over time, this can cause resource exhaustion or memory leaks within the kernel. Although this is a subtle bug related to resource management rather than a direct code execution or privilege escalation flaw, improper reference counting can degrade system stability and reliability. The vulnerability affects specific versions of the Linux kernel identified by commit hashes (01e5b728e9e43ae444e0369695a5f72209906464). No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that after a successful call to of_get_child_by_name(), the corresponding of_node_put() is called to properly decrement the reference count and prevent leaks. This vulnerability is primarily relevant to systems that utilize the Linux kernel's PHY networking stack and device tree infrastructure, which includes many embedded and server systems running Linux.
Potential Impact
For European organizations, the impact of CVE-2024-46767 is primarily related to system stability and reliability rather than direct security compromise. Organizations running Linux-based infrastructure, especially those using custom or embedded Linux kernels with PHY networking components, may experience increased kernel memory usage or resource exhaustion over time if the vulnerability is exploited or triggered repeatedly. This could lead to degraded network performance, system crashes, or the need for unplanned reboots, impacting availability of critical services. While this vulnerability does not directly expose confidentiality or integrity risks, the resulting instability could disrupt operations in sectors relying heavily on Linux servers or embedded devices, such as telecommunications, manufacturing, and cloud service providers. Given the widespread use of Linux in European data centers and industrial control systems, failure to patch this issue could lead to operational disruptions. However, the absence of known exploits and the technical nature of the flaw suggest a lower immediate risk of targeted attacks.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that address this reference counting issue as soon as they become available. Specifically, kernel maintainers and system administrators should update to the fixed kernel versions that include the of_node_put() call after of_get_child_by_name() succeeds. For embedded systems or custom Linux distributions, developers should review their kernel source trees to ensure the fix is backported appropriately. Additionally, organizations should implement continuous kernel monitoring to detect abnormal memory usage or resource leaks that could indicate exploitation or triggering of this vulnerability. Automated testing and code review processes should be enhanced to catch similar reference counting issues in kernel code. Finally, organizations should maintain robust incident response plans to quickly address any stability issues arising from this vulnerability and coordinate with Linux vendors for timely updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-46767: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net: phy: Fix missing of_node_put() for leds The call of of_get_child_by_name() will cause refcount incremented for leds, if it succeeds, it should call of_node_put() to decrease it, fix it.
AI-Powered Analysis
Technical Analysis
CVE-2024-46767 is a vulnerability identified in the Linux kernel's networking PHY (physical layer) subsystem, specifically related to the handling of device tree nodes for LEDs. The issue arises from improper reference count management when the kernel function of_get_child_by_name() is called to retrieve a child node named 'leds'. This function increments the reference count of the device tree node it returns, and if successful, the caller is responsible for decrementing this count by calling of_node_put(). The vulnerability is due to a missing call to of_node_put(), which leads to a reference count leak. Over time, this can cause resource exhaustion or memory leaks within the kernel. Although this is a subtle bug related to resource management rather than a direct code execution or privilege escalation flaw, improper reference counting can degrade system stability and reliability. The vulnerability affects specific versions of the Linux kernel identified by commit hashes (01e5b728e9e43ae444e0369695a5f72209906464). No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that after a successful call to of_get_child_by_name(), the corresponding of_node_put() is called to properly decrement the reference count and prevent leaks. This vulnerability is primarily relevant to systems that utilize the Linux kernel's PHY networking stack and device tree infrastructure, which includes many embedded and server systems running Linux.
Potential Impact
For European organizations, the impact of CVE-2024-46767 is primarily related to system stability and reliability rather than direct security compromise. Organizations running Linux-based infrastructure, especially those using custom or embedded Linux kernels with PHY networking components, may experience increased kernel memory usage or resource exhaustion over time if the vulnerability is exploited or triggered repeatedly. This could lead to degraded network performance, system crashes, or the need for unplanned reboots, impacting availability of critical services. While this vulnerability does not directly expose confidentiality or integrity risks, the resulting instability could disrupt operations in sectors relying heavily on Linux servers or embedded devices, such as telecommunications, manufacturing, and cloud service providers. Given the widespread use of Linux in European data centers and industrial control systems, failure to patch this issue could lead to operational disruptions. However, the absence of known exploits and the technical nature of the flaw suggest a lower immediate risk of targeted attacks.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that address this reference counting issue as soon as they become available. Specifically, kernel maintainers and system administrators should update to the fixed kernel versions that include the of_node_put() call after of_get_child_by_name() succeeds. For embedded systems or custom Linux distributions, developers should review their kernel source trees to ensure the fix is backported appropriately. Additionally, organizations should implement continuous kernel monitoring to detect abnormal memory usage or resource leaks that could indicate exploitation or triggering of this vulnerability. Automated testing and code review processes should be enhanced to catch similar reference counting issues in kernel code. Finally, organizations should maintain robust incident response plans to quickly address any stability issues arising from this vulnerability and coordinate with Linux vendors for timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.273Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9826c4522896dcbe1236
Added to database: 5/21/2025, 9:08:54 AM
Last enriched: 6/29/2025, 1:25:57 AM
Last updated: 7/26/2025, 5:46:00 PM
Views: 10
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.