CVE-2022-49712: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak. of_node_put() will check NULL pointer.
AI Analysis
Technical Summary
CVE-2022-49712 is a vulnerability identified in the Linux kernel specifically affecting the USB gadget driver for the LPC32xx platform (lpc32xx_udc). The issue arises from a reference count leak in the function lpc32xx_udc_probe. The root cause is improper management of device tree node references obtained via the of_parse_phandle() function. This function returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. The vulnerability exists because the code failed to call of_node_put(), leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to instability or denial of service. The fix involves adding the missing of_node_put() call to properly release the node reference, ensuring that the reference count is correctly decremented and preventing the leak. The vulnerability does not appear to have any known exploits in the wild and does not have a CVSS score assigned yet. It affects specific Linux kernel versions identified by a particular commit hash, indicating a narrow scope of affected versions. The vulnerability is technical and low-level, related to kernel resource management rather than direct code execution or privilege escalation.
Potential Impact
For European organizations, the impact of CVE-2022-49712 is primarily related to system stability and availability rather than direct compromise of confidentiality or integrity. Systems running Linux kernels with the affected USB gadget driver on LPC32xx hardware platforms could experience resource leaks that degrade performance or cause kernel crashes over time. This could disrupt operations, particularly in embedded systems or specialized devices using this hardware and driver combination. While the vulnerability does not enable remote code execution or privilege escalation, denial of service through kernel instability could affect critical infrastructure or industrial control systems relying on these devices. The impact is more pronounced in environments where LPC32xx-based Linux systems are deployed at scale or in critical roles. Since no known exploits exist, the immediate threat level is low, but unpatched systems remain at risk of stability issues. European organizations with embedded Linux devices or industrial equipment using this driver should assess exposure and prioritize patching to maintain operational continuity.
Mitigation Recommendations
To mitigate CVE-2022-49712, organizations should: 1) Identify all Linux systems running the affected kernel versions with the lpc32xx_udc USB gadget driver enabled, focusing on embedded and industrial devices. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. If official patches are not yet available, consider backporting the fix from the latest kernel source. 3) Monitor system logs and kernel metrics for signs of resource exhaustion or instability that could indicate the leak is impacting operations. 4) Implement proactive kernel update policies for embedded and industrial Linux devices to ensure timely application of security fixes. 5) Where possible, isolate affected devices from critical network segments to reduce risk of cascading failures. 6) Engage with hardware and device vendors to confirm patch availability and deployment timelines for affected platforms. 7) Conduct thorough testing of patched kernels in staging environments before production rollout to avoid regressions. These steps go beyond generic advice by focusing on embedded device identification, patch backporting, and operational monitoring specific to this kernel-level resource leak.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Finland
CVE-2022-49712: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak. of_node_put() will check NULL pointer.
AI-Powered Analysis
Technical Analysis
CVE-2022-49712 is a vulnerability identified in the Linux kernel specifically affecting the USB gadget driver for the LPC32xx platform (lpc32xx_udc). The issue arises from a reference count leak in the function lpc32xx_udc_probe. The root cause is improper management of device tree node references obtained via the of_parse_phandle() function. This function returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. The vulnerability exists because the code failed to call of_node_put(), leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially leading to instability or denial of service. The fix involves adding the missing of_node_put() call to properly release the node reference, ensuring that the reference count is correctly decremented and preventing the leak. The vulnerability does not appear to have any known exploits in the wild and does not have a CVSS score assigned yet. It affects specific Linux kernel versions identified by a particular commit hash, indicating a narrow scope of affected versions. The vulnerability is technical and low-level, related to kernel resource management rather than direct code execution or privilege escalation.
Potential Impact
For European organizations, the impact of CVE-2022-49712 is primarily related to system stability and availability rather than direct compromise of confidentiality or integrity. Systems running Linux kernels with the affected USB gadget driver on LPC32xx hardware platforms could experience resource leaks that degrade performance or cause kernel crashes over time. This could disrupt operations, particularly in embedded systems or specialized devices using this hardware and driver combination. While the vulnerability does not enable remote code execution or privilege escalation, denial of service through kernel instability could affect critical infrastructure or industrial control systems relying on these devices. The impact is more pronounced in environments where LPC32xx-based Linux systems are deployed at scale or in critical roles. Since no known exploits exist, the immediate threat level is low, but unpatched systems remain at risk of stability issues. European organizations with embedded Linux devices or industrial equipment using this driver should assess exposure and prioritize patching to maintain operational continuity.
Mitigation Recommendations
To mitigate CVE-2022-49712, organizations should: 1) Identify all Linux systems running the affected kernel versions with the lpc32xx_udc USB gadget driver enabled, focusing on embedded and industrial devices. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. If official patches are not yet available, consider backporting the fix from the latest kernel source. 3) Monitor system logs and kernel metrics for signs of resource exhaustion or instability that could indicate the leak is impacting operations. 4) Implement proactive kernel update policies for embedded and industrial Linux devices to ensure timely application of security fixes. 5) Where possible, isolate affected devices from critical network segments to reduce risk of cascading failures. 6) Engage with hardware and device vendors to confirm patch availability and deployment timelines for affected platforms. 7) Conduct thorough testing of patched kernels in staging environments before production rollout to avoid regressions. These steps go beyond generic advice by focusing on embedded device identification, patch backporting, and operational monitoring specific to this kernel-level resource leak.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.444Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe48fc
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:39:52 AM
Last updated: 1/7/2026, 6:07:44 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.