CVE-2022-49683: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI Analysis
Technical Summary
CVE-2022-49683 is a vulnerability identified in the Linux kernel, specifically within the Industrial I/O (IIO) subsystem's Analog-to-Digital Converter (ADC) driver for ADI AXI ADC devices. The issue arises from a reference count leak in the function adi_axi_adc_attach_client. The root cause is improper management of device tree node references: the function of_parse_phandle() returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. The vulnerability occurs because the code omitted this decrement, leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially degrading system stability or causing denial of service (DoS) conditions. The vulnerability does not appear to allow direct code execution or privilege escalation but can impact system availability by exhausting kernel resources. The issue has been fixed by adding the missing of_node_put() call to properly release the node reference. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The affected versions are specific Linux kernel commits identified by their hashes, indicating that this is a recent or narrowly scoped vulnerability in certain kernel versions. This vulnerability is technical and low-level, affecting systems using the ADI AXI ADC driver in the Linux kernel, which is common in embedded systems, industrial devices, and specialized hardware platforms.
Potential Impact
For European organizations, the impact of CVE-2022-49683 depends largely on the deployment of Linux systems using the affected ADC driver. Organizations operating industrial control systems (ICS), manufacturing automation, or embedded devices that rely on ADI AXI ADC hardware and Linux kernel versions containing this flaw may experience system instability or denial of service due to kernel resource exhaustion. This could disrupt critical infrastructure, manufacturing lines, or IoT deployments. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact could be significant in environments where uptime and reliability are critical. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes. European sectors such as automotive manufacturing, energy, telecommunications, and industrial automation, which often use Linux-based embedded systems, could be affected. The impact is less relevant for general-purpose Linux servers or desktops unless they use the specific hardware driver.
Mitigation Recommendations
To mitigate CVE-2022-49683, European organizations should: 1) Identify Linux systems running kernels with the affected ADI AXI ADC driver versions, particularly in embedded or industrial environments. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. This may require updating to a newer kernel version or backporting the patch for long-term support kernels. 3) Monitor system logs and kernel resource usage for signs of reference count leaks or resource exhaustion. 4) For critical industrial systems, implement redundancy and failover mechanisms to minimize downtime in case of kernel instability. 5) Engage with hardware and Linux distribution vendors to ensure timely patch availability and deployment. 6) Limit access to affected systems to trusted personnel and networks to reduce risk of accidental or malicious triggering of the vulnerability. 7) Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden, Finland, Poland, Belgium, Spain
CVE-2022-49683: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
AI-Powered Analysis
Technical Analysis
CVE-2022-49683 is a vulnerability identified in the Linux kernel, specifically within the Industrial I/O (IIO) subsystem's Analog-to-Digital Converter (ADC) driver for ADI AXI ADC devices. The issue arises from a reference count leak in the function adi_axi_adc_attach_client. The root cause is improper management of device tree node references: the function of_parse_phandle() returns a node pointer with an incremented reference count, which must be decremented using of_node_put() when the node is no longer needed. The vulnerability occurs because the code omitted this decrement, leading to a reference count leak. Over time, this leak can cause resource exhaustion in the kernel, potentially degrading system stability or causing denial of service (DoS) conditions. The vulnerability does not appear to allow direct code execution or privilege escalation but can impact system availability by exhausting kernel resources. The issue has been fixed by adding the missing of_node_put() call to properly release the node reference. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The affected versions are specific Linux kernel commits identified by their hashes, indicating that this is a recent or narrowly scoped vulnerability in certain kernel versions. This vulnerability is technical and low-level, affecting systems using the ADI AXI ADC driver in the Linux kernel, which is common in embedded systems, industrial devices, and specialized hardware platforms.
Potential Impact
For European organizations, the impact of CVE-2022-49683 depends largely on the deployment of Linux systems using the affected ADC driver. Organizations operating industrial control systems (ICS), manufacturing automation, or embedded devices that rely on ADI AXI ADC hardware and Linux kernel versions containing this flaw may experience system instability or denial of service due to kernel resource exhaustion. This could disrupt critical infrastructure, manufacturing lines, or IoT deployments. While the vulnerability does not directly expose data confidentiality or integrity, the availability impact could be significant in environments where uptime and reliability are critical. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to potential future exploitation or accidental crashes. European sectors such as automotive manufacturing, energy, telecommunications, and industrial automation, which often use Linux-based embedded systems, could be affected. The impact is less relevant for general-purpose Linux servers or desktops unless they use the specific hardware driver.
Mitigation Recommendations
To mitigate CVE-2022-49683, European organizations should: 1) Identify Linux systems running kernels with the affected ADI AXI ADC driver versions, particularly in embedded or industrial environments. 2) Apply the official Linux kernel patches that add the missing of_node_put() call to fix the reference count leak. This may require updating to a newer kernel version or backporting the patch for long-term support kernels. 3) Monitor system logs and kernel resource usage for signs of reference count leaks or resource exhaustion. 4) For critical industrial systems, implement redundancy and failover mechanisms to minimize downtime in case of kernel instability. 5) Engage with hardware and Linux distribution vendors to ensure timely patch availability and deployment. 6) Limit access to affected systems to trusted personnel and networks to reduce risk of accidental or malicious triggering of the vulnerability. 7) Incorporate this vulnerability into vulnerability management and patching workflows to ensure ongoing compliance and risk reduction.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:21:30.440Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4830
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 12:11:13 AM
Last updated: 10/15/2025, 7:11:25 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-6592: CWE-306 Missing Authentication for Critical Function in WatchGuard Authentication Gateway
CriticalCVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
CriticalCVE-2025-62371: CWE-295: Improper Certificate Validation in opensearch-project data-prepper
HighCVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate
HighCVE-2025-62381: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in ciscoheat sveltekit-superforms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.