In the Linux kernel, the following vulnerability has been resolved:
net: sched: fix possible refcount leak in tc_new_tfilter()
tfilter_put need to be called to put the refount got by tp->ops->get to
avoid possible refcount leak when chain->tmplt_ops != NULL and
chain->tmplt_ops != tp->ops.
References
Configurations
Configuration 1 (hide)
|
History
13 Jan 2025, 19:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-Other | |
References | () https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88 - Patch | |
References | () https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596 - Patch | |
References | () https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a - Patch | |
References | () https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5 - Patch | |
References | () https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* |
Information
Published : 2024-04-28 13:15
Updated : 2025-01-13 19:58
NVD link : CVE-2022-48639
Mitre link : CVE-2022-48639
CVE.ORG link : CVE-2022-48639
JSON object : View
Products Affected
linux
- linux_kernel
CWE