CVE-2022-49683: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI Analysis
Technical Summary
CVE-2022-49683 is a vulnerability identified in the Linux kernel, specifically within the Industrial I/O (IIO) subsystem's Analog-to-Digital Converter (ADC) driver for ADI AXI ADC devices. The issue arises from a reference count leak in the function adi_axi_adc_attach_client. The root cause is improper management of device tree node references: the function of_parse_phandle() returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. The vulnerability occurs because the code omitted this decrement, leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially degrading system stability or causing denial of service (DoS) conditions. The vulnerability does not appear to allow direct code execution or privilege escalation but can impact system availability by exhausting kernel resources. The issue has been fixed by adding the missing of_node_put() call to properly release the node reference. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The affected versions are specific Linux kernel commits identified by their hashes, indicating that this is a recent or narrowly scoped vulnerability in certain kernel versions. This vulnerability is technical and low-level, affecting systems using the ADI AXI ADC driver in the Linux kernel, which is common in embedded systems, industrial devices, and specialized hardware platforms.
Potential Impact
For European organizations, the impact of CVE-2022-49683 depends largely on the deployment of Linux systems using the affected ADC driver. Organizations operating industrial control systems (ICS), manufacturing automation, or embedded devices that rely on ADI AXI ADC hardware and Linux kernel versions containing this flaw may experience system instability or denial of service due to kernel resource exhaustion. This could disrupt critical infrastructure, manufacturing lines, or IoT deployments. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact could be significant in environments where uptime and reliability are critical. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes. European sectors such as automotive manufacturing, energy, telecommunications, and industrial automation, which often use Linux-based embedded systems, could be affected. The impact is less relevant for general-purpose Linux servers or desktops unless they use the specific hardware driver.
Mitigation Recommendations
To mitigate CVE-2022-49683, European organizations should: 1) Identify Linux systems running kernels with the affected ADI AXI ADC driver versions, particularly in embedded or industrial environments. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. This may require updating to a newer kernel version or backporting the patch for long-term support kernels. 3) Monitor system logs and kernel resource usage for signs of reference count leaks or resource exhaustion. 4) For critical industrial systems, implement redundancy and failover mechanisms to minimize downtime in case of kernel instability. 5) Engage with hardware and Linux distribution vendors to ensure timely patch availability and deployment. 6) Limit access to affected systems to trusted personnel and networks to reduce risk of accidental or malicious triggering of the vulnerability. 7) Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden, Finland, Poland, Belgium, Spain
CVE-2022-49683: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49683 is a vulnerability identified in the Linux kernel, specifically within the Industrial I/O (IIO) subsystem's Analog-to-Digital Converter (ADC) driver for ADI AXI ADC devices. The issue arises from a reference count leak in the function adi_axi_adc_attach_client. The root cause is improper management of device tree node references: the function of_parse_phandle() returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. The vulnerability occurs because the code omitted this decrement, leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially degrading system stability or causing denial of service (DoS) conditions. The vulnerability does not appear to allow direct code execution or privilege escalation but can impact system availability by exhausting kernel resources. The issue has been fixed by adding the missing of_node_put() call to properly release the node reference. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The affected versions are specific Linux kernel commits identified by their hashes, indicating that this is a recent or narrowly scoped vulnerability in certain kernel versions. This vulnerability is technical and low-level, affecting systems using the ADI AXI ADC driver in the Linux kernel, which is common in embedded systems, industrial devices, and specialized hardware platforms.
Potential Impact
For European organizations, the impact of CVE-2022-49683 depends largely on the deployment of Linux systems using the affected ADC driver. Organizations operating industrial control systems (ICS), manufacturing automation, or embedded devices that rely on ADI AXI ADC hardware and Linux kernel versions containing this flaw may experience system instability or denial of service due to kernel resource exhaustion. This could disrupt critical infrastructure, manufacturing lines, or IoT deployments. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact could be significant in environments where uptime and reliability are critical. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes. European sectors such as automotive manufacturing, energy, telecommunications, and industrial automation, which often use Linux-based embedded systems, could be affected. The impact is less relevant for general-purpose Linux servers or desktops unless they use the specific hardware driver.
Mitigation Recommendations
To mitigate CVE-2022-49683, European organizations should: 1) Identify Linux systems running kernels with the affected ADI AXI ADC driver versions, particularly in embedded or industrial environments. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. This may require updating to a newer kernel version or backporting the patch for long-term support kernels. 3) Monitor system logs and kernel resource usage for signs of reference count leaks or resource exhaustion. 4) For critical industrial systems, implement redundancy and failover mechanisms to minimize downtime in case of kernel instability. 5) Engage with hardware and Linux distribution vendors to ensure timely patch availability and deployment. 6) Limit access to affected systems to trusted personnel and networks to reduce risk of accidental or malicious triggering of the vulnerability. 7) Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.440Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4830
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:11:13 AM
Last updated: 7/29/2025, 7:41:16 PM
Views: 10
Related Threats
CVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8940: Buffer Overflow in Tenda AC20
HighCVE-2025-8939: Buffer Overflow in Tenda AC20
HighCVE-2025-50518: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.