CVE-2022-49477: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ASoC: samsung: Fix refcount leak in aries_audio_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. If extcon_find_edev_by_node() fails, it doesn't call of_node_put() Calling of_node_put() after extcon_find_edev_by_node() to fix this.
AI Analysis
Technical Summary
CVE-2022-49477 is a vulnerability identified in the Linux kernel specifically related to the ALSA System on Chip (ASoC) Samsung driver component, particularly in the aries_audio_probe function. The issue arises from improper reference count management of device tree nodes. The function of_parse_phandle() returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. However, in the affected code path, if extcon_find_edev_by_node() fails, the corresponding call to of_node_put() is omitted, resulting in a reference count leak. This leak can lead to resource exhaustion over time as the kernel accumulates unreleased references to device tree nodes. While this vulnerability does not directly allow code execution or privilege escalation, it can degrade system stability and reliability, potentially causing kernel memory leaks and eventual denial of service due to resource depletion. The vulnerability affects specific versions of the Linux kernel containing the Samsung ASoC driver code with the described flaw. The fix involves ensuring that of_node_put() is called after extcon_find_edev_by_node() regardless of success or failure, thus properly releasing the reference count and preventing leaks. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2022-49477 is primarily related to system stability and availability rather than direct compromise of confidentiality or integrity. Organizations running Linux systems with Samsung ASoC audio drivers, particularly in embedded devices, IoT equipment, or specialized hardware that rely on this kernel component, may experience gradual resource leaks leading to kernel memory exhaustion. This can cause system slowdowns, crashes, or reboots, disrupting critical services or operations. In environments where uptime and reliability are essential—such as telecommunications infrastructure, industrial control systems, or healthcare devices—this vulnerability could result in operational interruptions. However, since exploitation does not appear to allow privilege escalation or remote code execution, the risk of direct data breaches is low. The absence of known exploits reduces immediate threat levels but does not eliminate the need for remediation to maintain system robustness.
Mitigation Recommendations
To mitigate CVE-2022-49477, organizations should: 1) Apply the official Linux kernel patches that fix the reference count leak in the Samsung ASoC aries_audio_probe driver as soon as they become available from trusted sources or Linux distribution vendors. 2) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain updated firmware or kernel versions incorporating the fix. 3) Monitor system logs and kernel messages for signs of resource leaks or instability that could indicate the presence of this issue. 4) Implement proactive kernel memory and resource monitoring to detect abnormal reference count growth or memory exhaustion early. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to critical workloads to reduce impact. 6) Maintain an up-to-date inventory of Linux kernel versions and affected components across the organization to prioritize patch deployment effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49477: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ASoC: samsung: Fix refcount leak in aries_audio_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. If extcon_find_edev_by_node() fails, it doesn't call of_node_put() Calling of_node_put() after extcon_find_edev_by_node() to fix this.
AI-Powered Analysis
Technical Analysis
CVE-2022-49477 is a vulnerability identified in the Linux kernel specifically related to the ALSA System on Chip (ASoC) Samsung driver component, particularly in the aries_audio_probe function. The issue arises from improper reference count management of device tree nodes. The function of_parse_phandle() returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. However, in the affected code path, if extcon_find_edev_by_node() fails, the corresponding call to of_node_put() is omitted, resulting in a reference count leak. This leak can lead to resource exhaustion over time as the kernel accumulates unreleased references to device tree nodes. While this vulnerability does not directly allow code execution or privilege escalation, it can degrade system stability and reliability, potentially causing kernel memory leaks and eventual denial of service due to resource depletion. The vulnerability affects specific versions of the Linux kernel containing the Samsung ASoC driver code with the described flaw. The fix involves ensuring that of_node_put() is called after extcon_find_edev_by_node() regardless of success or failure, thus properly releasing the reference count and preventing leaks. No known exploits are currently reported in the wild, and no CVSS score has been assigned to this vulnerability as of the publication date.
Potential Impact
For European organizations, the impact of CVE-2022-49477 is primarily related to system stability and availability rather than direct compromise of confidentiality or integrity. Organizations running Linux systems with Samsung ASoC audio drivers, particularly in embedded devices, IoT equipment, or specialized hardware that rely on this kernel component, may experience gradual resource leaks leading to kernel memory exhaustion. This can cause system slowdowns, crashes, or reboots, disrupting critical services or operations. In environments where uptime and reliability are essential—such as telecommunications infrastructure, industrial control systems, or healthcare devices—this vulnerability could result in operational interruptions. However, since exploitation does not appear to allow privilege escalation or remote code execution, the risk of direct data breaches is low. The absence of known exploits reduces immediate threat levels but does not eliminate the need for remediation to maintain system robustness.
Mitigation Recommendations
To mitigate CVE-2022-49477, organizations should: 1) Apply the official Linux kernel patches that fix the reference count leak in the Samsung ASoC aries_audio_probe driver as soon as they become available from trusted sources or Linux distribution vendors. 2) For embedded or specialized devices, coordinate with hardware vendors or device manufacturers to obtain updated firmware or kernel versions incorporating the fix. 3) Monitor system logs and kernel messages for signs of resource leaks or instability that could indicate the presence of this issue. 4) Implement proactive kernel memory and resource monitoring to detect abnormal reference count growth or memory exhaustion early. 5) In environments where patching is delayed, consider isolating affected devices or limiting their exposure to critical workloads to reduce impact. 6) Maintain an up-to-date inventory of Linux kernel versions and affected components across the organization to prioritize patch deployment effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.581Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ec4522896dcbe5b8c
Added to database: 5/21/2025, 9:09:02 AM
Last enriched: 6/30/2025, 4:25:11 PM
Last updated: 8/10/2025, 3:03:35 PM
Views: 10
Related Threats
CVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8940: Buffer Overflow in Tenda AC20
HighCVE-2025-8939: Buffer Overflow in Tenda AC20
HighCVE-2025-50518: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.