Skip to main content

CVE-2022-49480: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49480cvecve-2022-49480
Published: Wed Feb 26 2025 (02/26/2025, 02:13:20 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe of_find_device_by_node() takes reference, we should use put_device() to release it. when devm_kzalloc() fails, it doesn't have a put_device(), it will cause refcount leak. Add missing put_device() to fix this.

AI-Powered Analysis

AILast updated: 06/30/2025, 16:26:02 UTC

Technical Analysis

CVE-2022-49480 is a vulnerability identified in the Linux kernel specifically within the ASoC (ALSA System on Chip) imx-hdmi driver component. The issue arises from a reference count leak in the imx_hdmi_probe function. The root cause is improper management of device references: the function of_find_device_by_node() increments the reference count on a device object, but in error handling paths—specifically when devm_kzalloc() fails—the corresponding put_device() call to decrement the reference count is missing. This omission leads to a reference count leak, meaning that device objects are not properly released. Over time, such leaks can cause resource exhaustion, potentially leading to system instability or denial of service. The vulnerability does not appear to allow direct code execution or privilege escalation but can degrade system reliability. The fix involves adding the missing put_device() call to ensure proper reference count balancing. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability affects Linux kernel versions containing the imx-hdmi driver with the specified commit hashes.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to system stability and availability. Organizations that deploy Linux-based systems using the imx-hdmi driver—commonly found in embedded devices, industrial control systems, or specialized hardware using i.MX processors with HDMI output—may experience resource leaks leading to degraded performance or crashes. This could affect critical infrastructure, manufacturing environments, or any embedded systems relying on these drivers. While the vulnerability does not directly compromise confidentiality or integrity, the resulting denial of service or system instability could disrupt business operations, especially in sectors relying on continuous uptime. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental system failures.

Mitigation Recommendations

Organizations should prioritize updating Linux kernel versions to include the patch that fixes the reference count leak in the imx_hdmi_probe function. Since this is a kernel-level fix, deploying updated kernel packages from trusted Linux distributions or compiling patched kernels is essential. For embedded or industrial systems where kernel updates are less frequent, vendors should be contacted for firmware or kernel updates incorporating this fix. Additionally, monitoring system logs for unusual device reference count warnings or memory/resource exhaustion symptoms can help detect potential issues. Implementing robust system resource monitoring and automated alerts for abnormal kernel behavior will aid in early detection. Where possible, isolating affected devices or limiting their exposure to untrusted inputs can reduce risk until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.581Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5b9a

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 4:26:02 PM

Last updated: 7/29/2025, 5:29:10 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats