Skip to main content

CVE-2022-49240: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49240cvecve-2022-49240
Published: Wed Feb 26 2025 (02/26/2025, 01:56:02 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: mt8195: Fix error handling in mt8195_mt6359_rt1019_rt5682_dev_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This function only calls of_node_put() in the regular path. And it will cause refcount leak in error path.

AI-Powered Analysis

AILast updated: 06/30/2025, 04:41:06 UTC

Technical Analysis

CVE-2022-49240 is a vulnerability identified in the Linux kernel specifically related to the ALSA System on Chip (ASoC) subsystem for MediaTek mt8195 SoC audio driver. The issue arises in the error handling logic of the function mt8195_mt6359_rt1019_rt5682_dev_probe, where a device_node pointer obtained via of_parse_phandle() is not properly released in error paths. The function of_parse_phandle() returns a device_node pointer with its reference count incremented, which requires a corresponding call to of_node_put() to decrement the reference count and avoid leaks. However, the vulnerable code only calls of_node_put() in the regular (success) path and neglects to do so in error conditions, causing a reference count leak. This leak can lead to resource exhaustion in kernel memory management over time if the error path is triggered repeatedly. Although this vulnerability does not directly allow code execution or privilege escalation, the improper resource management can degrade system stability and reliability, potentially causing denial of service (DoS) conditions. The vulnerability is specific to the MediaTek mt8195 audio driver stack in the Linux kernel, affecting devices using this hardware and kernel version. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves ensuring that of_node_put() is called in all code paths, including error handling, to properly release the device_node reference and prevent leaks.

Potential Impact

For European organizations, the impact of CVE-2022-49240 is primarily related to system stability and availability rather than direct data compromise. Organizations using Linux-based systems with MediaTek mt8195 SoC hardware, particularly in embedded or specialized audio processing devices, may experience kernel resource leaks leading to degraded performance or system crashes under certain error conditions. This could affect industrial control systems, telecommunications equipment, or IoT devices deployed in sectors such as manufacturing, automotive, or smart infrastructure. While the vulnerability does not enable remote code execution or privilege escalation, repeated triggering of the error path could cause denial of service, impacting operational continuity. Given the niche hardware involved, the overall impact on mainstream enterprise IT infrastructure is limited, but critical embedded systems relying on this hardware could be vulnerable to stability issues if unpatched. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to maintain system reliability.

Mitigation Recommendations

To mitigate CVE-2022-49240, organizations should: 1) Apply the official Linux kernel patches that fix the error handling in the mt8195_mt6359_rt1019_rt5682_dev_probe function, ensuring that of_node_put() is called on all code paths to prevent reference count leaks. 2) Identify and inventory devices running Linux kernels with the affected MediaTek mt8195 audio driver, focusing on embedded and specialized hardware platforms. 3) Test and deploy updated kernel versions or backported patches in a controlled manner to minimize disruption. 4) Monitor system logs and kernel error messages for signs of resource leaks or instability related to audio driver initialization failures. 5) Implement kernel memory and resource monitoring tools to detect abnormal reference count growth or memory exhaustion symptoms. 6) Engage with hardware vendors and Linux distribution maintainers to confirm patch availability and deployment timelines. 7) For critical systems where patching is delayed, consider isolating affected devices or limiting exposure to untrusted inputs that might trigger error paths in the driver. These steps go beyond generic advice by focusing on targeted patching, device inventory, and proactive monitoring specific to the MediaTek mt8195 audio driver context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T01:49:39.294Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982dc4522896dcbe53c1

Added to database: 5/21/2025, 9:09:01 AM

Last enriched: 6/30/2025, 4:41:06 AM

Last updated: 7/31/2025, 4:08:31 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats