Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.8, < 5.10.127 |
References
- https://git.kernel.org/stable/c/501652a2ad5450b4908e1f204ce75b2414c305b7Patch
- https://git.kernel.org/stable/c/5eaa84e1605035a90a64d25b6cba79e89d188175Patch
- https://git.kernel.org/stable/c/ab7bf025cee89db73c649216ddd2bc589c3d3862Patch
- https://git.kernel.org/stable/c/ada7b0c0dedafd7d059115adf49e48acba3153a8Patch
FAQ
What is CVE-2022-49683?
CVE-2022-49683 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client of_parse_phandle() returns a node pointer with refcount incr...
How severe is CVE-2022-49683?
CVE-2022-49683 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49683?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.