Skip to main content

CVE-2022-49717: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-49717cvecve-2022-49717
Published: Wed Feb 26 2025 (02/26/2025, 02:24:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: irqchip/apple-aic: Fix refcount leak in build_fiq_affinity of_find_node_by_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.

AI-Powered Analysis

AILast updated: 06/30/2025, 00:40:27 UTC

Technical Analysis

CVE-2022-49717 is a vulnerability identified in the Linux kernel specifically related to the irqchip/apple-aic component. The issue arises from a reference count leak in the function build_fiq_affinity. The root cause is improper management of device tree node references: the function of_find_node_by_phandle() returns a node pointer with its reference count incremented, but the code failed to call of_node_put() to decrement the reference count when the node is no longer needed. This omission leads to a reference count leak, which over time can cause resource exhaustion within the kernel. The vulnerability is a memory management flaw rather than a direct code execution or privilege escalation bug. The leak could degrade system stability or cause denial of service if the kernel runs out of memory or other resources due to unreleased references. The fix involves adding the missing of_node_put() calls to ensure proper reference counting and resource cleanup. The affected versions are identified by specific commit hashes, indicating this is a recent and targeted fix. There are no known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability does not appear to require user interaction or authentication, but exploitation would likely require local access or the ability to trigger the affected kernel code path. Since this is a kernel-level resource leak, it impacts system reliability and availability rather than confidentiality or integrity directly.

Potential Impact

For European organizations, the impact of CVE-2022-49717 primarily concerns system stability and availability. Linux is widely used across European enterprises, government agencies, and critical infrastructure, often powering servers, embedded devices, and network equipment. A reference count leak in the kernel could lead to gradual resource depletion, causing system slowdowns, crashes, or reboots. This can disrupt business operations, especially in environments requiring high availability such as financial services, telecommunications, healthcare, and manufacturing. While this vulnerability does not directly expose sensitive data or allow privilege escalation, the resulting denial of service conditions could be exploited by attackers to cause operational disruptions. Organizations relying on Apple hardware running Linux or embedded systems using the apple-aic irqchip driver are particularly at risk. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future attacks or accidental system failures.

Mitigation Recommendations

To mitigate CVE-2022-49717, European organizations should: 1) Apply the latest Linux kernel updates that include the patch fixing the reference count leak in the irqchip/apple-aic component. 2) Identify systems running affected kernel versions, especially those using Apple hardware or embedded devices with the apple-aic irqchip driver, and prioritize patching. 3) Implement monitoring for kernel resource usage and system stability to detect early signs of resource leaks or degradation. 4) Employ automated patch management processes to ensure timely deployment of kernel updates. 5) For critical systems where immediate patching is not feasible, consider isolating affected devices or limiting access to reduce risk of triggering the vulnerability. 6) Maintain regular backups and disaster recovery plans to minimize impact from potential system outages. 7) Engage with hardware and Linux distribution vendors to confirm patch availability and compatibility.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-26T02:21:30.445Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982cc4522896dcbe492e

Added to database: 5/21/2025, 9:09:00 AM

Last enriched: 6/30/2025, 12:40:27 AM

Last updated: 8/15/2025, 12:35:49 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats