CVE-2022-49714: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: irqchip/realtek-rtl: Fix refcount leak in map_interrupts of_find_node_by_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. This function doesn't call of_node_put() in error path. Call of_node_put() directly after of_property_read_u32() to cover both normal path and error path.
AI Analysis
Technical Summary
CVE-2022-49714 is a vulnerability identified in the Linux kernel, specifically within the irqchip/realtek-rtl driver code. The issue arises from a reference count leak related to the handling of device tree nodes in the function of_find_node_by_phandle(). This function returns a pointer to a device tree node with its reference count incremented, which requires a corresponding call to of_node_put() to decrement the reference count once the node is no longer needed. The vulnerability occurs because of_node_put() is not called in the error path after of_property_read_u32(), leading to a reference count leak. Over time, this leak can cause resource exhaustion or instability in the kernel due to unreleased references. The fix involves ensuring that of_node_put() is called immediately after of_property_read_u32(), covering both normal and error execution paths, thereby preventing the leak. This vulnerability affects Linux kernel versions containing the specified commit hashes and is related to the Realtek RTL interrupt controller driver. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49714 depends largely on their use of Linux systems running affected kernel versions with the Realtek RTL irqchip driver enabled. The vulnerability could lead to kernel instability or denial of service conditions due to resource leaks, potentially affecting critical infrastructure, servers, or embedded devices. Organizations relying on Linux-based systems in telecommunications, industrial control, or networking equipment that use Realtek hardware could see degraded system reliability or unexpected reboots. Although no direct data confidentiality or integrity compromise is indicated, availability could be impacted, which is critical for business continuity and service delivery. Given the ubiquity of Linux in European IT environments, especially in servers and embedded systems, unpatched systems could face operational disruptions. However, the lack of known exploits and the need for specific hardware and kernel configurations somewhat limit the immediate risk.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2022-49714. Specifically, kernel maintainers and system administrators should verify that the Realtek RTL irqchip driver is updated to include the corrected reference counting behavior. For embedded or specialized devices, firmware or kernel updates from vendors should be applied promptly. Additionally, organizations should audit their Linux systems to identify those running affected kernel versions and hardware configurations. Implementing monitoring for kernel stability and resource usage can help detect potential exploitation or impact. Where possible, restricting access to systems with vulnerable kernels and minimizing exposure to untrusted inputs can reduce risk. Coordination with hardware vendors and Linux distribution maintainers is recommended to ensure timely patch deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-49714: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: irqchip/realtek-rtl: Fix refcount leak in map_interrupts of_find_node_by_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. This function doesn't call of_node_put() in error path. Call of_node_put() directly after of_property_read_u32() to cover both normal path and error path.
AI-Powered Analysis
Technical Analysis
CVE-2022-49714 is a vulnerability identified in the Linux kernel, specifically within the irqchip/realtek-rtl driver code. The issue arises from a reference count leak related to the handling of device tree nodes in the function of_find_node_by_phandle(). This function returns a pointer to a device tree node with its reference count incremented, which requires a corresponding call to of_node_put() to decrement the reference count once the node is no longer needed. The vulnerability occurs because of_node_put() is not called in the error path after of_property_read_u32(), leading to a reference count leak. Over time, this leak can cause resource exhaustion or instability in the kernel due to unreleased references. The fix involves ensuring that of_node_put() is called immediately after of_property_read_u32(), covering both normal and error execution paths, thereby preventing the leak. This vulnerability affects Linux kernel versions containing the specified commit hashes and is related to the Realtek RTL interrupt controller driver. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2022-49714 depends largely on their use of Linux systems running affected kernel versions with the Realtek RTL irqchip driver enabled. The vulnerability could lead to kernel instability or denial of service conditions due to resource leaks, potentially affecting critical infrastructure, servers, or embedded devices. Organizations relying on Linux-based systems in telecommunications, industrial control, or networking equipment that use Realtek hardware could see degraded system reliability or unexpected reboots. Although no direct data confidentiality or integrity compromise is indicated, availability could be impacted, which is critical for business continuity and service delivery. Given the ubiquity of Linux in European IT environments, especially in servers and embedded systems, unpatched systems could face operational disruptions. However, the lack of known exploits and the need for specific hardware and kernel configurations somewhat limit the immediate risk.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel to the latest patched versions that include the fix for CVE-2022-49714. Specifically, kernel maintainers and system administrators should verify that the Realtek RTL irqchip driver is updated to include the corrected reference counting behavior. For embedded or specialized devices, firmware or kernel updates from vendors should be applied promptly. Additionally, organizations should audit their Linux systems to identify those running affected kernel versions and hardware configurations. Implementing monitoring for kernel stability and resource usage can help detect potential exploitation or impact. Where possible, restricting access to systems with vulnerable kernels and minimizing exposure to untrusted inputs can reduce risk. Coordination with hardware vendors and Linux distribution maintainers is recommended to ensure timely patch deployment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.444Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4909
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:39:59 AM
Last updated: 8/20/2025, 5:10:36 PM
Views: 16
Related Threats
CVE-2025-55455: n/a
HighCVE-2025-8193
UnknownCVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.