Skip to main content

CVE-2022-49517: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49517cvecve-2022-49517
Published: Wed Feb 26 2025 (02/26/2025, 02:13:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 17:27:27 UTC

Technical Analysis

CVE-2022-49517 is a vulnerability identified in the Linux kernel specifically within the ALSA System on Chip (ASoC) subsystem for Mediatek platforms. The issue arises in the mt2701_wm8960_machine_probe function where a node pointer, obtained via the of_parse_phandle() function, is not properly released by calling of_node_put(). The of_parse_phandle() function increments the reference count of the device tree node it returns, and failing to decrement this count leads to a reference count leak. This leak can cause resource exhaustion over time, potentially leading to degraded system performance or instability. While the vulnerability does not directly enable code execution or privilege escalation, the improper management of kernel object references can contribute to system reliability issues. The patch involves adding the missing of_node_put() call to correctly decrement the reference count and prevent the leak. The affected versions are specific Linux kernel commits identified by the hash 8625c1dbd87631572f8e2c05bc67736b73d6f02f, indicating a narrow scope of affected code. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The vulnerability is technical and subtle, primarily impacting embedded or specialized Linux systems using the Mediatek mt2701 platform with the wm8960 audio codec machine driver.

Potential Impact

For European organizations, the impact of CVE-2022-49517 is likely limited but still relevant for entities deploying embedded Linux systems based on Mediatek mt2701 SoCs, particularly in IoT devices, industrial control systems, or specialized hardware using the ASoC subsystem. The resource leak could lead to gradual degradation of system stability or availability, potentially causing device crashes or reboots in critical environments. This may affect operational continuity in sectors relying on embedded Linux devices such as manufacturing, telecommunications, or smart infrastructure. However, since the vulnerability does not allow direct code execution or privilege escalation, the confidentiality and integrity of data are not directly threatened. The absence of known exploits and the technical nature of the flaw reduce the immediate risk, but organizations should remain vigilant as resource leaks can be leveraged in complex attack chains or cause denial-of-service conditions over time.

Mitigation Recommendations

To mitigate CVE-2022-49517, European organizations should: 1) Apply the official Linux kernel patches that include the fix for the missing of_node_put() call in the mt2701_wm8960_machine_probe function as soon as they become available. 2) For embedded device manufacturers or integrators, ensure that custom kernel builds incorporate this fix and conduct thorough regression testing on affected hardware platforms. 3) Monitor device logs and system metrics for signs of resource leaks or instability that could indicate the presence of this issue. 4) Implement robust update mechanisms for embedded devices to facilitate timely deployment of kernel security patches. 5) Where possible, isolate critical embedded systems from untrusted networks to reduce exposure. 6) Engage with hardware and software vendors to confirm the inclusion of this fix in future firmware or kernel releases. These steps go beyond generic advice by focusing on embedded Linux environments and emphasizing proactive patch management and monitoring tailored to the affected subsystem and hardware.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:08:31.587Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe5cad

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 5:27:27 PM

Last updated: 8/11/2025, 12:06:36 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats