CVE-2022-49161: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: Fix error handling in mt8183_da7219_max98357_dev_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This function only calls of_node_put() in the regular path. And it will cause refcount leak in error paths. Fix this by calling of_node_put() in error handling too.
AI Analysis
Technical Summary
CVE-2022-49161 is a vulnerability identified in the Linux kernel specifically affecting the ALSA System on Chip (ASoC) driver for MediaTek hardware, particularly the mt8183_da7219_max98357 device probe function. The root cause is improper error handling related to reference counting of device tree nodes. The function of_parse_phandle() returns a device_node pointer with an incremented reference count, which must be decremented by calling of_node_put() once the pointer is no longer needed. However, the vulnerable code only calls of_node_put() in the normal execution path and neglects to do so in error handling paths. This results in a reference count leak when errors occur during device probing. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to degraded system stability or crashes. The vulnerability does not appear to allow direct code execution or privilege escalation but can impact system reliability due to resource leakage. The affected versions are specific Linux kernel commits identified by hash, indicating this is a low-level kernel source code issue. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that of_node_put() is called in all error handling paths to properly decrement the reference count and prevent leaks.
Potential Impact
For European organizations relying on Linux-based systems with MediaTek mt8183 SoC hardware, particularly embedded or IoT devices using the affected ASoC driver, this vulnerability could lead to kernel resource leaks and eventual system instability or crashes. While the vulnerability does not directly compromise confidentiality or integrity, availability could be impacted if the kernel runs out of resources due to leaked references, causing device reboots or failures. This could disrupt critical services, especially in environments where embedded Linux devices are used in industrial control, telecommunications, or network infrastructure. The impact is more pronounced in long-running systems where the leak accumulates over time. However, since exploitation requires triggering error paths in device probing, the attack surface is limited to scenarios involving device initialization or reinitialization. European organizations with large deployments of MediaTek-based Linux devices should be aware of potential stability issues and plan for patching to maintain operational continuity.
Mitigation Recommendations
1. Apply the official Linux kernel patches that fix the reference count leak in the mt8183_da7219_max98357_dev_probe function as soon as they are available from trusted sources or Linux distributions. 2. For organizations using custom or embedded Linux kernels, ensure that kernel source trees are updated to include this fix and rebuild affected kernels. 3. Monitor device logs for kernel warnings or errors related to device probing or memory/resource leaks that could indicate the presence of this issue. 4. Implement proactive device lifecycle management to periodically reboot or refresh devices to mitigate the impact of potential resource leaks until patches are applied. 5. Engage with hardware vendors and Linux distribution maintainers to confirm the presence of this fix in their releases and coordinate timely updates. 6. Limit access to device initialization interfaces to trusted administrators to reduce the risk of triggering error paths maliciously. 7. Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Finland
CVE-2022-49161: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: Fix error handling in mt8183_da7219_max98357_dev_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This function only calls of_node_put() in the regular path. And it will cause refcount leak in error paths. Fix this by calling of_node_put() in error handling too.
AI-Powered Analysis
Technical Analysis
CVE-2022-49161 is a vulnerability identified in the Linux kernel specifically affecting the ALSA System on Chip (ASoC) driver for MediaTek hardware, particularly the mt8183_da7219_max98357 device probe function. The root cause is improper error handling related to reference counting of device tree nodes. The function of_parse_phandle() returns a device_node pointer with an incremented reference count, which must be decremented by calling of_node_put() once the pointer is no longer needed. However, the vulnerable code only calls of_node_put() in the normal execution path and neglects to do so in error handling paths. This results in a reference count leak when errors occur during device probing. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to degraded system stability or crashes. The vulnerability does not appear to allow direct code execution or privilege escalation but can impact system reliability due to resource leakage. The affected versions are specific Linux kernel commits identified by hash, indicating this is a low-level kernel source code issue. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that of_node_put() is called in all error handling paths to properly decrement the reference count and prevent leaks.
Potential Impact
For European organizations relying on Linux-based systems with MediaTek mt8183 SoC hardware, particularly embedded or IoT devices using the affected ASoC driver, this vulnerability could lead to kernel resource leaks and eventual system instability or crashes. While the vulnerability does not directly compromise confidentiality or integrity, availability could be impacted if the kernel runs out of resources due to leaked references, causing device reboots or failures. This could disrupt critical services, especially in environments where embedded Linux devices are used in industrial control, telecommunications, or network infrastructure. The impact is more pronounced in long-running systems where the leak accumulates over time. However, since exploitation requires triggering error paths in device probing, the attack surface is limited to scenarios involving device initialization or reinitialization. European organizations with large deployments of MediaTek-based Linux devices should be aware of potential stability issues and plan for patching to maintain operational continuity.
Mitigation Recommendations
1. Apply the official Linux kernel patches that fix the reference count leak in the mt8183_da7219_max98357_dev_probe function as soon as they are available from trusted sources or Linux distributions. 2. For organizations using custom or embedded Linux kernels, ensure that kernel source trees are updated to include this fix and rebuild affected kernels. 3. Monitor device logs for kernel warnings or errors related to device probing or memory/resource leaks that could indicate the presence of this issue. 4. Implement proactive device lifecycle management to periodically reboot or refresh devices to mitigate the impact of potential resource leaks until patches are applied. 5. Engage with hardware vendors and Linux distribution maintainers to confirm the presence of this fix in their releases and coordinate timely updates. 6. Limit access to device initialization interfaces to trusted administrators to reduce the risk of triggering error paths maliciously. 7. Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.277Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe50dd
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 3:40:29 AM
Last updated: 8/3/2025, 12:33:48 PM
Views: 17
Related Threats
CVE-2025-8937: Command Injection in TOTOLINK N350R
MediumCVE-2025-8936: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-5942: CWE-122 Heap-based Buffer Overflow in Netskope Netskope Client
MediumCVE-2025-5941: CWE-125 Out-of-Bounds Read in Netskope Netskope Client
LowCVE-2025-0309: Vulnerability in Netskope Netskope Client
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.