Skip to main content

CVE-2022-49117: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49117cvecve-2022-49117
Published: Wed Feb 26 2025 (02/26/2025, 01:54:59 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: mips: ralink: fix a refcount leak in ill_acc_of_setup() of_node_put(np) needs to be called when pdev == NULL.

AI-Powered Analysis

AILast updated: 06/30/2025, 02:57:08 UTC

Technical Analysis

CVE-2022-49117 is a vulnerability identified in the Linux kernel, specifically affecting the MIPS architecture with Ralink chipset support. The issue arises from a reference count leak in the function ill_acc_of_setup(), which is part of the device tree handling code for the Ralink platform. The root cause is the failure to call of_node_put(np) when the platform device pointer (pdev) is NULL, leading to a resource leak. This flaw could potentially cause kernel memory management issues, such as memory leaks or resource exhaustion, if the affected code path is exercised. Although the vulnerability does not appear to directly enable privilege escalation or code execution, the leak could degrade system stability or availability over time, especially in embedded or network devices relying on this kernel code. The vulnerability has been officially published and fixed in the Linux kernel source, but no CVSS score has been assigned, and no known exploits are reported in the wild at this time.

Potential Impact

For European organizations, the impact of CVE-2022-49117 primarily concerns systems running Linux on MIPS-based Ralink hardware, which is common in embedded devices such as routers, IoT devices, and network appliances. While the vulnerability does not directly lead to remote code execution or privilege escalation, the reference count leak can cause gradual resource depletion, potentially leading to system instability, crashes, or denial of service. This could disrupt critical network infrastructure or embedded systems used in industrial control, telecommunications, or enterprise environments. Organizations relying on such hardware for essential services may experience degraded performance or outages if the vulnerability is exploited or triggered inadvertently. Given the prevalence of Linux in European IT infrastructure and the use of embedded devices in various sectors, the vulnerability warrants attention to maintain system reliability and availability.

Mitigation Recommendations

To mitigate CVE-2022-49117, European organizations should: 1) Identify and inventory all devices running Linux kernels on MIPS architecture with Ralink chipsets, focusing on embedded and network devices. 2) Apply the official Linux kernel patches that fix the reference count leak as soon as they become available from trusted sources or device vendors. 3) For devices where kernel updates are not immediately feasible, monitor system logs and resource usage closely to detect abnormal memory or resource consumption patterns that may indicate exploitation or triggering of the leak. 4) Engage with hardware and device manufacturers to obtain firmware updates incorporating the kernel fix. 5) Implement network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks, reducing the risk of exploitation. 6) Incorporate this vulnerability into vulnerability management and patching workflows to ensure timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.263Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4f57

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 2:57:08 AM

Last updated: 8/12/2025, 2:20:04 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats