CVE-2022-49212

In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init The reference counting issue happens in several error handling paths on a refcounted object "nc->dmac". In these paths, the function simply returns the error code, forgetting to balance the reference count of "nc->dmac", increased earlier by dma_request_channel(), which may cause refcount leaks. Fix it by decrementing the refcount of specific object in those error paths.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Mar 2025, 19:31

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0856bf27057561f42b37df111603cf5a0d040294 - () https://git.kernel.org/stable/c/0856bf27057561f42b37df111603cf5a0d040294 - Patch
References () https://git.kernel.org/stable/c/8baea2b96fa90af8d0f937caf4cf2105ee094d93 - () https://git.kernel.org/stable/c/8baea2b96fa90af8d0f937caf4cf2105ee094d93 - Patch
References () https://git.kernel.org/stable/c/9843c9c98f26c6ad843260b19bfdaa2598f2ae1e - () https://git.kernel.org/stable/c/9843c9c98f26c6ad843260b19bfdaa2598f2ae1e - Patch
References () https://git.kernel.org/stable/c/9b08d211db4c447eb1a07df65e45e0aa772e0fa6 - () https://git.kernel.org/stable/c/9b08d211db4c447eb1a07df65e45e0aa772e0fa6 - Patch
References () https://git.kernel.org/stable/c/a3587259ae553e41d1ce8c7435351a5d6b299a11 - () https://git.kernel.org/stable/c/a3587259ae553e41d1ce8c7435351a5d6b299a11 - Patch
References () https://git.kernel.org/stable/c/f1694169f3674cdf7553aed06864254635679878 - () https://git.kernel.org/stable/c/f1694169f3674cdf7553aed06864254635679878 - Patch
References () https://git.kernel.org/stable/c/fe0e2ce5c87e9c0b9485ff566362030aa55972cf - () https://git.kernel.org/stable/c/fe0e2ce5c87e9c0b9485ff566362030aa55972cf - Patch
References () https://git.kernel.org/stable/c/fecbd4a317c95d73c849648c406bcf1b6a0ec1cf - () https://git.kernel.org/stable/c/fecbd4a317c95d73c849648c406bcf1b6a0ec1cf - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: rawnand: atmel: soluciona el problema de recuento de referencias en atmel_nand_controller_init El problema de recuento de referencias ocurre en varias rutas de manejo de errores en un objeto con recuento de referencias "nc->dmac". En estas rutas, la función simplemente devuelve el código de error, olvidando equilibrar el recuento de referencias de "nc->dmac", aumentado anteriormente por dma_request_channel(), lo que puede causar fugas de recuento de referencias. Arréglelo disminuyendo el recuento de referencias de un objeto específico en esas rutas de error.
CWE NVD-CWE-Other

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-18 19:31


NVD link : CVE-2022-49212

Mitre link : CVE-2022-49212

CVE.ORG link : CVE-2022-49212


JSON object : View

Products Affected

linux

  • linux_kernel