Vulnerability Details : CVE-2022-49679
In the Linux kernel, the following vulnerability has been resolved:
ARM: Fix refcount leak in axxia_boot_secondary
of_find_compatible_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
Products affected by CVE-2022-49679
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-49679
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-49679
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2025-03-11 |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2022-49679 | 2025-02-27 |
References for CVE-2022-49679
-
https://git.kernel.org/stable/c/b385cb59aac8d61c29bc72ebf3d19a536914af96
Patch
-
https://git.kernel.org/stable/c/71e12e5b02674459a24f16e965255d63b31fe049
Patch
-
https://git.kernel.org/stable/c/a9b76c232a1ce4cbf27862097f7eb634dcc779eb
Patch
-
https://git.kernel.org/stable/c/7c7ff68daa93d8c4cdea482da4f2429c0398fcde
Patch
-
https://git.kernel.org/stable/c/4d9c60e868f7cf8e09956e7d5bb44d807d712699
Patch
-
https://git.kernel.org/stable/c/29ca9c4efacccdc15104a8d4bf10b5183fc92840
ARM: Fix refcount leak in axxia_boot_secondary - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/44a5b3a073e5aaa5720929dba95b2725eb32bb65
Patch
-
https://git.kernel.org/stable/c/3c19fe3f04f4f4e7a2b722c2fd3c98356fc1d72b
Patch
Jump to