CVE-2022-49346

In the Linux kernel, the following vulnerability has been resolved: net: dsa: lantiq_gswip: Fix refcount leak in gswip_gphy_fw_list Every iteration of for_each_available_child_of_node() decrements the reference count of the previous node. when breaking early from a for_each_available_child_of_node() loop, we need to explicitly call of_node_put() on the gphy_fw_np. Add missing of_node_put() to avoid refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*

History

14 Apr 2025, 19:45

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: lantiq_gswip: Se corrige la pérdida de recuento de referencias en gswip_gphy_fw_list Cada iteración de for_each_available_child_of_node() disminuye el recuento de referencias del nodo anterior. Al salir antes de un bucle for_each_available_child_of_node(), debemos llamar explícitamente a of_node_put() en gphy_fw_np. Agregue of_node_put() faltante para evitar la pérdida de recuento de referencias.
CWE NVD-CWE-Other
References () https://git.kernel.org/stable/c/0737e018a05e2aa352828c52bdeed3b02cff2930 - () https://git.kernel.org/stable/c/0737e018a05e2aa352828c52bdeed3b02cff2930 - Patch
References () https://git.kernel.org/stable/c/2e007ac6fa7c9c94ad84da075c5c504afad690a0 - () https://git.kernel.org/stable/c/2e007ac6fa7c9c94ad84da075c5c504afad690a0 - Patch
References () https://git.kernel.org/stable/c/32cd78c5610f02a929f63cac985e73692d05f33e - () https://git.kernel.org/stable/c/32cd78c5610f02a929f63cac985e73692d05f33e - Patch
References () https://git.kernel.org/stable/c/54d6802c4d83fa8de7696cfec06f475d5fd92d27 - () https://git.kernel.org/stable/c/54d6802c4d83fa8de7696cfec06f475d5fd92d27 - Patch
References () https://git.kernel.org/stable/c/7c8df6fad43d9d5d77f281f794b2a93cd02fd1a9 - () https://git.kernel.org/stable/c/7c8df6fad43d9d5d77f281f794b2a93cd02fd1a9 - Patch
References () https://git.kernel.org/stable/c/c2ae49a113a5344232f1ebb93bcf18bbd11e9c39 - () https://git.kernel.org/stable/c/c2ae49a113a5344232f1ebb93bcf18bbd11e9c39 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 19:45


NVD link : CVE-2022-49346

Mitre link : CVE-2022-49346

CVE.ORG link : CVE-2022-49346


JSON object : View

Products Affected

linux

  • linux_kernel