CVE-2022-49216

In the Linux kernel, the following vulnerability has been resolved: drm/tegra: Fix reference leak in tegra_dsi_ganged_probe The reference taken by 'of_find_device_by_node()' must be released when not needed anymore. Add put_device() call to fix this.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Mar 2025, 19:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/tegra: Se corrige la pérdida de referencia en tegra_dsi_ganged_probe La referencia tomada por 'of_find_device_by_node()' debe liberarse cuando ya no se necesita. Agregue la llamada put_device() para corregir esto.
References () https://git.kernel.org/stable/c/0e2f4e434e71dffd1085c3dccd676514bd71d316 - () https://git.kernel.org/stable/c/0e2f4e434e71dffd1085c3dccd676514bd71d316 - Patch
References () https://git.kernel.org/stable/c/1e06710c43a090f14bb67714265a01cd1d7a37c5 - () https://git.kernel.org/stable/c/1e06710c43a090f14bb67714265a01cd1d7a37c5 - Patch
References () https://git.kernel.org/stable/c/221e3638feb8bc42143833c9a704fa89b6c366bb - () https://git.kernel.org/stable/c/221e3638feb8bc42143833c9a704fa89b6c366bb - Patch
References () https://git.kernel.org/stable/c/2d6ae8b747fe55f54de4a4441d636974aa53f56a - () https://git.kernel.org/stable/c/2d6ae8b747fe55f54de4a4441d636974aa53f56a - Patch
References () https://git.kernel.org/stable/c/5e8fdb6392d945d33fef959eab73f8c34bc0a63b - () https://git.kernel.org/stable/c/5e8fdb6392d945d33fef959eab73f8c34bc0a63b - Patch
References () https://git.kernel.org/stable/c/852c1f5f3119a38ee68e319bab10277fc1ab06b7 - () https://git.kernel.org/stable/c/852c1f5f3119a38ee68e319bab10277fc1ab06b7 - Patch
References () https://git.kernel.org/stable/c/a725070701883fe62266ee6d2f31d67e6cdd31df - () https://git.kernel.org/stable/c/a725070701883fe62266ee6d2f31d67e6cdd31df - Patch
References () https://git.kernel.org/stable/c/cd78b74031cbc94133965f1017deb822657fc1a6 - () https://git.kernel.org/stable/c/cd78b74031cbc94133965f1017deb822657fc1a6 - Patch
References () https://git.kernel.org/stable/c/f3c99c686e098300c246e5e8a1474133e3dacb05 - () https://git.kernel.org/stable/c/f3c99c686e098300c246e5e8a1474133e3dacb05 - Patch
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:00

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:00

Updated : 2025-03-18 19:32


NVD link : CVE-2022-49216

Mitre link : CVE-2022-49216

CVE.ORG link : CVE-2022-49216


JSON object : View

Products Affected

linux

  • linux_kernel