CVE-2022-49447: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ARM: hisi: Add missing of_node_put after of_find_compatible_node of_find_compatible_node will increment the refcount of the returned device_node. Calling of_node_put() to avoid the refcount leak
AI Analysis
Technical Summary
CVE-2022-49447 is a vulnerability identified in the Linux kernel specifically affecting the ARM architecture's HiSilicon (hisi) platform code. The issue arises from improper reference count management in the device tree handling code. The function of_find_compatible_node() is used to locate device nodes compatible with a given hardware identifier and increments the reference count of the returned device_node structure. However, the affected code failed to call of_node_put() to decrement this reference count after use, resulting in a reference count leak. Over time, this leak can lead to resource exhaustion in kernel memory management, potentially causing system instability or denial of service due to kernel memory depletion. The vulnerability is rooted in a missing cleanup step in the device tree node handling, which is a critical component in the Linux kernel for hardware abstraction and configuration. The vulnerability has been addressed by adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. The affected versions are identified by a specific commit hash, indicating this is a source-level issue in the kernel code. There are currently no known exploits in the wild, and no CVSS score has been assigned. The vulnerability does not appear to require user interaction or elevated privileges to manifest, but it is limited to ARM-based HiSilicon platforms running affected Linux kernel versions.
Potential Impact
For European organizations, the impact of CVE-2022-49447 is primarily related to systems running Linux on ARM-based HiSilicon hardware. This includes embedded systems, network devices, and potentially IoT devices that utilize this platform. The reference count leak can cause gradual resource exhaustion, leading to kernel instability or crashes, which may result in denial of service conditions. Critical infrastructure or industrial control systems using affected hardware could experience operational disruptions. However, since this vulnerability does not directly allow code execution or privilege escalation, the confidentiality and integrity impacts are limited. The main risk is availability degradation. Organizations relying on ARM HiSilicon Linux systems should be aware of potential service interruptions if the vulnerability is exploited or triggered by workload patterns. Given the lack of known exploits, the immediate threat level is moderate, but unpatched systems remain at risk of stability issues over time.
Mitigation Recommendations
To mitigate CVE-2022-49447, organizations should promptly update their Linux kernel to a version that includes the patch fixing the missing of_node_put() call. Kernel maintainers have addressed this in the source code, so applying the latest stable kernel releases or vendor-provided updates is critical. For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain patched firmware or kernel updates. Additionally, monitor system logs and kernel memory usage for signs of resource leaks or instability that could indicate the vulnerability is affecting operations. Implementing kernel memory usage monitoring tools and alerting on abnormal patterns can provide early detection. Where possible, isolate affected devices from critical networks to reduce impact if a denial of service occurs. Avoid running untrusted code or workloads that might trigger excessive device node lookups on vulnerable systems. Finally, maintain an inventory of ARM HiSilicon Linux systems to ensure all are accounted for in patching efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Finland
CVE-2022-49447: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ARM: hisi: Add missing of_node_put after of_find_compatible_node of_find_compatible_node will increment the refcount of the returned device_node. Calling of_node_put() to avoid the refcount leak
AI-Powered Analysis
Technical Analysis
CVE-2022-49447 is a vulnerability identified in the Linux kernel specifically affecting the ARM architecture's HiSilicon (hisi) platform code. The issue arises from improper reference count management in the device tree handling code. The function of_find_compatible_node() is used to locate device nodes compatible with a given hardware identifier and increments the reference count of the returned device_node structure. However, the affected code failed to call of_node_put() to decrement this reference count after use, resulting in a reference count leak. Over time, this leak can lead to resource exhaustion in kernel memory management, potentially causing system instability or denial of service due to kernel memory depletion. The vulnerability is rooted in a missing cleanup step in the device tree node handling, which is a critical component in the Linux kernel for hardware abstraction and configuration. The vulnerability has been addressed by adding the missing of_node_put() call to properly decrement the reference count and prevent the leak. The affected versions are identified by a specific commit hash, indicating this is a source-level issue in the kernel code. There are currently no known exploits in the wild, and no CVSS score has been assigned. The vulnerability does not appear to require user interaction or elevated privileges to manifest, but it is limited to ARM-based HiSilicon platforms running affected Linux kernel versions.
Potential Impact
For European organizations, the impact of CVE-2022-49447 is primarily related to systems running Linux on ARM-based HiSilicon hardware. This includes embedded systems, network devices, and potentially IoT devices that utilize this platform. The reference count leak can cause gradual resource exhaustion, leading to kernel instability or crashes, which may result in denial of service conditions. Critical infrastructure or industrial control systems using affected hardware could experience operational disruptions. However, since this vulnerability does not directly allow code execution or privilege escalation, the confidentiality and integrity impacts are limited. The main risk is availability degradation. Organizations relying on ARM HiSilicon Linux systems should be aware of potential service interruptions if the vulnerability is exploited or triggered by workload patterns. Given the lack of known exploits, the immediate threat level is moderate, but unpatched systems remain at risk of stability issues over time.
Mitigation Recommendations
To mitigate CVE-2022-49447, organizations should promptly update their Linux kernel to a version that includes the patch fixing the missing of_node_put() call. Kernel maintainers have addressed this in the source code, so applying the latest stable kernel releases or vendor-provided updates is critical. For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain patched firmware or kernel updates. Additionally, monitor system logs and kernel memory usage for signs of resource leaks or instability that could indicate the vulnerability is affecting operations. Implementing kernel memory usage monitoring tools and alerting on abnormal patterns can provide early detection. Where possible, isolate affected devices from critical networks to reduce impact if a denial of service occurs. Avoid running untrusted code or workloads that might trigger excessive device node lookups on vulnerable systems. Finally, maintain an inventory of ARM HiSilicon Linux systems to ensure all are accounted for in patching efforts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.571Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5a53
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 7:26:10 AM
Last updated: 1/7/2026, 4:14:58 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.