CVE-2022-49683

Source
https://cve.org/CVERecord?id=CVE-2022-49683
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49683.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49683
Downstream
Related
Published
2025-02-26T02:24:11.201Z
Modified
2026-04-11T12:44:23.779211Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client
Details

In the Linux kernel, the following vulnerability has been resolved:

iio: adc: adi-axi-adc: Fix refcount leak in adiaxiadcattachclient

ofparsephandle() returns a node pointer with refcount incremented, we should use ofnodeput() on it when not need anymore. Add missing ofnodeput() to avoid refcount leak.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49683.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ef04070692a21633ec6a60f80c19b6af44b3cf47
Fixed
501652a2ad5450b4908e1f204ce75b2414c305b7
Fixed
ab7bf025cee89db73c649216ddd2bc589c3d3862
Fixed
5eaa84e1605035a90a64d25b6cba79e89d188175
Fixed
ada7b0c0dedafd7d059115adf49e48acba3153a8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49683.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.8.0
Fixed
5.10.127
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.51
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.18.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49683.json"