Skip to main content

CVE-2022-49477: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49477cvecve-2022-49477
Published: Wed Feb 26 2025 (02/26/2025, 02:13:18 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: samsung: Fix refcount leak in aries_audio_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. If extcon_find_edev_by_node() fails, it doesn't call of_node_put() Calling of_node_put() after extcon_find_edev_by_node() to fix this.

AI-Powered Analysis

AILast updated: 06/30/2025, 16:25:11 UTC

Technical Analysis

CVE-2022-49477 is a vulnerability identified in the Linux kernel specifically related to the ALSA System on Chip (ASoC) Samsung driver component, particularly in the aries_audio_probe function. The issue arises from improper reference count management of device tree nodes. The function of_parse_phandle() returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. However, in the affected code path, if extcon_find_edev_by_node() fails, the corresponding call to of_node_put() is omitted, resulting in a reference count leak. This leak can lead to resource exhaustion over time as the kernel accumulates unreleased references to device tree nodes. While this vulnerability does not directly allow code execution or privilege escalation, it can degrade system stability and reliability, potentially causing kernel memory leaks and eventual denial of service due to resource depletion. The vulnerability affects specific versions of the Linux kernel containing the Samsung ASoC driver code with the described flaw. The fix involves ensuring that of_node_put() is called after extcon_find_edev_by_node() regardless of success or failure, thus properly releasing the reference count and preventing leaks. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability as of the publication date.

Potential Impact

For European organizations, the impact of CVE-2022-49477 is primarily related to system stability and availability rather than direct compromise of confidentiality or integrity. Organizations running Linux systems with Samsung ASoC audio drivers, particularly in embedded devices, IoT equipment, or specialized hardware that rely on this kernel component, may experience gradual resource leaks leading to kernel memory exhaustion. This can cause system slowdowns, crashes, or reboots, disrupting critical services or operations. In environments where uptime and reliability are essential—such as telecommunications infrastructure, industrial control systems, or healthcare devices—this vulnerability could result in operational interruptions. However, since exploitation does not appear to allow privilege escalation or remote code execution, the risk of direct data breaches is low. The absence of known exploits reduces immediate threat levels but does not eliminate the need for remediation to maintain system robustness.

Mitigation Recommendations

To mitigate CVE-2022-49477, organizations should: 1) Apply the official Linux kernel patches that fix the reference count leak in the Samsung ASoC aries_audio_probe driver as soon as they become available from trusted sources or Linux distribution vendors. 2) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain updated firmware or kernel versions incorporating the fix. 3) Monitor system logs and kernel messages for signs of resource leaks or instability that could indicate the presence of this issue. 4) Implement proactive kernel memory and resource monitoring to detect abnormal reference count growth or memory exhaustion early. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to critical workloads to reduce impact. 6) Maintain an up-to-date inventory of Linux kernel versions and affected components across the organization to prioritize patch deployment effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.581Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5b8c

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 4:25:11 PM

Last updated: 8/10/2025, 3:03:35 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats