Skip to main content

CVE-2022-49714: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49714cvecve-2022-49714
Published: Wed Feb 26 2025 (02/26/2025, 02:24:30 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: irqchip/realtek-rtl: Fix refcount leak in map_interrupts of_find_node_by_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. This function doesn't call of_node_put() in error path. Call of_node_put() directly after of_property_read_u32() to cover both normal path and error path.

AI-Powered Analysis

AILast updated: 06/30/2025, 00:39:59 UTC

Technical Analysis

CVE-2022-49714 is a vulnerability identified in the Linux kernel, specifically within the irqchip/realtek-rtl driver code. The issue arises from a reference count leak related to the handling of device tree nodes in the function of_find_node_by_phandle(). This function returns a pointer to a device tree node with its reference count incremented, which requires a corresponding call to of_node_put() to decrement the reference count once the node is no longer needed. The vulnerability occurs because of_node_put() is not called in the error path after of_property_read_u32(), leading to a reference count leak. Over time, this leak can cause resource exhaustion or instability in the kernel due to unreleased references. The fix involves ensuring that of_node_put() is called immediately after of_property_read_u32(), covering both normal and error execution paths, thereby preventing the leak. This vulnerability affects Linux kernel versions containing the specified commit hashes and is related to the Realtek RTL interrupt controller driver. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2022-49714 depends largely on their use of Linux systems running affected kernel versions with the Realtek RTL irqchip driver enabled. The vulnerability could lead to kernel instability or denial of service conditions due to resource leaks, potentially affecting critical infrastructure, servers, or embedded devices. Organizations relying on Linux-based systems in telecommunications, industrial control, or networking equipment that use Realtek hardware could see degraded system reliability or unexpected reboots. Although no direct data confidentiality or integrity compromise is indicated, availability could be impacted, which is critical for business continuity and service delivery. Given the ubiquity of Linux in European IT environments, especially in servers and embedded systems, unpatched systems could face operational disruptions. However, the lack of known exploits and the need for specific hardware and kernel configurations somewhat limit the immediate risk.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2022-49714. Specifically, kernel maintainers and system administrators should verify that the Realtek RTL irqchip driver is updated to include the corrected reference counting behavior. For embedded or specialized devices, firmware or kernel updates from vendors should be applied promptly. Additionally, organizations should audit their Linux systems to identify those running affected kernel versions and hardware configurations. Implementing monitoring for kernel stability and resource usage can help detect potential exploitation or impact. Where possible, restricting access to systems with vulnerable kernels and minimizing exposure to untrusted inputs can reduce risk. Coordination with hardware vendors and Linux distribution maintainers is recommended to ensure timely patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.444Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe4909

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 12:39:59 AM

Last updated: 8/20/2025, 5:10:36 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats