CVE-2022-49370

In the Linux kernel, the following vulnerability has been resolved: firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle kobject_init_and_add() takes reference even when it fails. According to the doc of kobject_init_and_add() If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Fix this issue by calling kobject_put().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 20:42

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3ba359ebe914ac3f8c6c832b28007c14c39d3766 - () https://git.kernel.org/stable/c/3ba359ebe914ac3f8c6c832b28007c14c39d3766 - Patch
References () https://git.kernel.org/stable/c/660ba678f9998aca6db74f2dd912fa5124f0fa31 - () https://git.kernel.org/stable/c/660ba678f9998aca6db74f2dd912fa5124f0fa31 - Patch
References () https://git.kernel.org/stable/c/985706bd3bbeffc8737bc05965ca8d24837bc7db - () https://git.kernel.org/stable/c/985706bd3bbeffc8737bc05965ca8d24837bc7db - Patch
References () https://git.kernel.org/stable/c/a724634b2a49f6ff0177a9e19a5a92fc1545e1b7 - () https://git.kernel.org/stable/c/a724634b2a49f6ff0177a9e19a5a92fc1545e1b7 - Patch
References () https://git.kernel.org/stable/c/a9bfb37d6ba7c376b0d53337a4c5f5ff324bd725 - () https://git.kernel.org/stable/c/a9bfb37d6ba7c376b0d53337a4c5f5ff324bd725 - Patch
References () https://git.kernel.org/stable/c/c66cc3c62870a27ea8f060a7e4c1ad8d26dd3f0d - () https://git.kernel.org/stable/c/c66cc3c62870a27ea8f060a7e4c1ad8d26dd3f0d - Patch
References () https://git.kernel.org/stable/c/ec752973aa721ee281d5441e497364637c626c7b - () https://git.kernel.org/stable/c/ec752973aa721ee281d5441e497364637c626c7b - Patch
References () https://git.kernel.org/stable/c/ed38d04342dfbe9e5aca745c8b5eb4188a74f0ef - () https://git.kernel.org/stable/c/ed38d04342dfbe9e5aca745c8b5eb4188a74f0ef - Patch
References () https://git.kernel.org/stable/c/fdffa4ad8f6bf1ece877edfb807f2b2c729d8578 - () https://git.kernel.org/stable/c/fdffa4ad8f6bf1ece877edfb807f2b2c729d8578 - Patch
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: dmi-sysfs: Se corrige la pérdida de memoria en dmi_sysfs_register_handle kobject_init_and_add() toma la referencia incluso cuando falla. Según la documentación de kobject_init_and_add(), si esta función devuelve un error, se debe llamar a kobject_put() para limpiar correctamente la memoria asociada con el objeto. Solucione este problema llamando a kobject_put().

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 20:42


NVD link : CVE-2022-49370

Mitre link : CVE-2022-49370

CVE.ORG link : CVE-2022-49370


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime