CVE-2022-49679: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ARM: Fix refcount leak in axxia_boot_secondary of_find_compatible_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.
AI Analysis
Technical Summary
CVE-2022-49679 is a vulnerability identified in the Linux kernel specifically affecting ARM architecture implementations. The issue arises from a reference count leak in the function axxia_boot_secondary. The root cause is related to the improper handling of device tree node pointers returned by the function of_find_compatible_node(). This function returns a node pointer with an incremented reference count, which must be decremented using of_node_put() once the node is no longer needed. The vulnerability exists because the Linux kernel code failed to call of_node_put(), leading to a reference count leak. Over time, this leak can cause resource exhaustion in kernel memory management, potentially leading to degraded system performance or instability. The vulnerability does not appear to allow direct code execution or privilege escalation but can affect system reliability. The flaw is specific to certain Linux kernel versions identified by the commit hash 1d22924e1c4e299337e86e290c02c3e3eb43b608 and impacts ARM-based systems using the axxia_boot_secondary function. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak.
Potential Impact
For European organizations, the impact of CVE-2022-49679 primarily concerns ARM-based Linux systems, which are increasingly common in embedded devices, IoT infrastructure, and specialized industrial equipment. Organizations relying on ARM Linux servers, network appliances, or embedded controllers could experience system instability or crashes due to resource leaks if the vulnerability is exploited or triggered by workload patterns. While this vulnerability does not directly lead to data breaches or privilege escalation, the resulting denial of service or system degradation could disrupt critical services, especially in sectors like manufacturing, telecommunications, and critical infrastructure. The impact is more pronounced in environments with limited system resources or where uptime is critical. Since no active exploits are known, the immediate risk is low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the leak.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to include the patch that adds the missing of_node_put() call in the axxia_boot_secondary function. This requires tracking kernel updates from trusted Linux distributions or directly applying patches if using custom kernels. Additionally, organizations should audit ARM-based Linux systems to identify affected versions and monitor system logs for signs of resource exhaustion or instability. Implementing resource monitoring tools that track kernel memory usage and reference counts can help detect early signs of leaks. For embedded and IoT devices, firmware updates incorporating the fix should be deployed promptly. Network segmentation and limiting access to vulnerable devices can reduce the risk of exploitation. Finally, organizations should maintain a robust patch management process to quickly respond to kernel vulnerabilities, especially in ARM environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2022-49679: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ARM: Fix refcount leak in axxia_boot_secondary of_find_compatible_node() returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49679 is a vulnerability identified in the Linux kernel specifically affecting ARM architecture implementations. The issue arises from a reference count leak in the function axxia_boot_secondary. The root cause is related to the improper handling of device tree node pointers returned by the function of_find_compatible_node(). This function returns a node pointer with an incremented reference count, which must be decremented using of_node_put() once the node is no longer needed. The vulnerability exists because the Linux kernel code failed to call of_node_put(), leading to a reference count leak. Over time, this leak can cause resource exhaustion in kernel memory management, potentially leading to degraded system performance or instability. The vulnerability does not appear to allow direct code execution or privilege escalation but can affect system reliability. The flaw is specific to certain Linux kernel versions identified by the commit hash 1d22924e1c4e299337e86e290c02c3e3eb43b608 and impacts ARM-based systems using the axxia_boot_secondary function. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The fix involves adding the missing of_node_put() call to properly decrement the reference count and prevent the leak.
Potential Impact
For European organizations, the impact of CVE-2022-49679 primarily concerns ARM-based Linux systems, which are increasingly common in embedded devices, IoT infrastructure, and specialized industrial equipment. Organizations relying on ARM Linux servers, network appliances, or embedded controllers could experience system instability or crashes due to resource leaks if the vulnerability is exploited or triggered by workload patterns. While this vulnerability does not directly lead to data breaches or privilege escalation, the resulting denial of service or system degradation could disrupt critical services, especially in sectors like manufacturing, telecommunications, and critical infrastructure. The impact is more pronounced in environments with limited system resources or where uptime is critical. Since no active exploits are known, the immediate risk is low, but unpatched systems remain vulnerable to potential future exploitation or accidental triggering of the leak.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to include the patch that adds the missing of_node_put() call in the axxia_boot_secondary function. This requires tracking kernel updates from trusted Linux distributions or directly applying patches if using custom kernels. Additionally, organizations should audit ARM-based Linux systems to identify affected versions and monitor system logs for signs of resource exhaustion or instability. Implementing resource monitoring tools that track kernel memory usage and reference counts can help detect early signs of leaks. For embedded and IoT devices, firmware updates incorporating the fix should be deployed promptly. Network segmentation and limiting access to vulnerable devices can reduce the risk of exploitation. Finally, organizations should maintain a robust patch management process to quickly respond to kernel vulnerabilities, especially in ARM environments.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.439Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe47f8
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:10:27 AM
Last updated: 1/7/2026, 5:20:50 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.