CVE-2022-49239: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This is similar to commit 64b92de9603f ("ASoC: wcd9335: fix a leaked reference by adding missing of_node_put")
AI Analysis
Technical Summary
CVE-2022-49239 is a vulnerability identified in the Linux kernel, specifically within the ALSA System on Chip (ASoC) codec driver for the wcd934x audio codec. The issue arises from a missing call to of_node_put(), which is necessary to decrement the reference count of a device_node pointer obtained via of_parse_phandle(). The device_node pointer is returned with an incremented reference count, and failing to call of_node_put() after use results in a reference count leak. This leak can cause resource exhaustion over time, potentially leading to degraded system performance or instability. The vulnerability is similar to a previously addressed issue in the wcd9335 codec driver, where a missing of_node_put() call was fixed to prevent a leaked reference. The root cause is a resource management flaw rather than a direct memory corruption or privilege escalation bug. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The affected Linux kernel versions are identified by a specific commit hash, indicating the vulnerability is present in certain kernel builds prior to patching. The fix involves adding the missing of_node_put() call to properly release the device_node reference after parsing codec data.
Potential Impact
For European organizations relying on Linux-based systems, particularly those using embedded devices or systems with the wcd934x audio codec (common in mobile and IoT devices), this vulnerability could lead to gradual resource leaks. Over extended periods, this may cause system instability or crashes, impacting availability of critical services. While the vulnerability does not directly enable privilege escalation or data leakage, the resulting instability could disrupt operations, especially in environments where uptime and reliability are critical, such as telecommunications infrastructure, industrial control systems, or healthcare devices. The impact is more pronounced in devices with limited resources where reference leaks can quickly exhaust available memory or kernel objects. Since the vulnerability is in a low-level kernel driver, it affects a broad range of Linux distributions and devices using affected kernel versions. However, the absence of known exploits and the nature of the flaw suggest the immediate risk is moderate, primarily affecting system stability rather than confidentiality or integrity.
Mitigation Recommendations
European organizations should ensure that all Linux systems, especially those running on embedded platforms or using the wcd934x codec, are updated to the latest kernel versions where this vulnerability is patched. Specifically, kernel updates that include the fix adding the missing of_node_put() call should be applied promptly. For devices where kernel updates are not immediately feasible, monitoring system logs and resource usage for signs of reference leaks or instability is recommended. Organizations should also implement robust patch management processes to track and deploy kernel updates. For critical infrastructure, consider isolating affected devices or employing redundancy to mitigate potential downtime. Additionally, vendors of embedded devices should be engaged to provide updated firmware incorporating the patched kernel. Since this is a resource leak issue, standard security controls like access restrictions and intrusion detection will not prevent the vulnerability but can help detect anomalous system behavior resulting from exploitation attempts or system degradation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2022-49239: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This is similar to commit 64b92de9603f ("ASoC: wcd9335: fix a leaked reference by adding missing of_node_put")
AI-Powered Analysis
Technical Analysis
CVE-2022-49239 is a vulnerability identified in the Linux kernel, specifically within the ALSA System on Chip (ASoC) codec driver for the wcd934x audio codec. The issue arises from a missing call to of_node_put(), which is necessary to decrement the reference count of a device_node pointer obtained via of_parse_phandle(). The device_node pointer is returned with an incremented reference count, and failing to call of_node_put() after use results in a reference count leak. This leak can cause resource exhaustion over time, potentially leading to degraded system performance or instability. The vulnerability is similar to a previously addressed issue in the wcd9335 codec driver, where a missing of_node_put() call was fixed to prevent a leaked reference. The root cause is a resource management flaw rather than a direct memory corruption or privilege escalation bug. No known exploits are currently reported in the wild, and no CVSS score has been assigned. The affected Linux kernel versions are identified by a specific commit hash, indicating the vulnerability is present in certain kernel builds prior to patching. The fix involves adding the missing of_node_put() call to properly release the device_node reference after parsing codec data.
Potential Impact
For European organizations relying on Linux-based systems, particularly those using embedded devices or systems with the wcd934x audio codec (common in mobile and IoT devices), this vulnerability could lead to gradual resource leaks. Over extended periods, this may cause system instability or crashes, impacting availability of critical services. While the vulnerability does not directly enable privilege escalation or data leakage, the resulting instability could disrupt operations, especially in environments where uptime and reliability are critical, such as telecommunications infrastructure, industrial control systems, or healthcare devices. The impact is more pronounced in devices with limited resources where reference leaks can quickly exhaust available memory or kernel objects. Since the vulnerability is in a low-level kernel driver, it affects a broad range of Linux distributions and devices using affected kernel versions. However, the absence of known exploits and the nature of the flaw suggest the immediate risk is moderate, primarily affecting system stability rather than confidentiality or integrity.
Mitigation Recommendations
European organizations should ensure that all Linux systems, especially those running on embedded platforms or using the wcd934x codec, are updated to the latest kernel versions where this vulnerability is patched. Specifically, kernel updates that include the fix adding the missing of_node_put() call should be applied promptly. For devices where kernel updates are not immediately feasible, monitoring system logs and resource usage for signs of reference leaks or instability is recommended. Organizations should also implement robust patch management processes to track and deploy kernel updates. For critical infrastructure, consider isolating affected devices or employing redundancy to mitigate potential downtime. Additionally, vendors of embedded devices should be engaged to provide updated firmware incorporating the patched kernel. Since this is a resource leak issue, standard security controls like access restrictions and intrusion detection will not prevent the vulnerability but can help detect anomalous system behavior resulting from exploitation attempts or system degradation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T01:49:39.294Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe53b9
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 4:40:54 AM
Last updated: 8/16/2025, 4:44:18 PM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.