CVE-2022-49382

In the Linux kernel, the following vulnerability has been resolved: soc: rockchip: Fix refcount leak in rockchip_grf_init of_find_matching_node_and_match returns a node pointer with refcount incremented, we should use of_node_put() on it when done. Add missing of_node_put() to avoid refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Apr 2025, 20:43

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: rockchip: Se ha corregido la pérdida de recuento de referencias en rockchip_grf_init. of_find_matching_node_and_match devuelve un puntero de nodo con el recuento de referencias incrementado. Deberíamos usar of_node_put() en él cuando haya terminado. Se ha añadido el error of_node_put() que falta para evitar la pérdida de recuento de referencias.
References () https://git.kernel.org/stable/c/042571fe1d171773655ad706715ecc865913d9a4 - () https://git.kernel.org/stable/c/042571fe1d171773655ad706715ecc865913d9a4 - Patch
References () https://git.kernel.org/stable/c/28133325526b92921f3269fdf97a20d90b92b217 - () https://git.kernel.org/stable/c/28133325526b92921f3269fdf97a20d90b92b217 - Patch
References () https://git.kernel.org/stable/c/5b3e990f85eb034faa461e691e719e8ce9e2a3c8 - () https://git.kernel.org/stable/c/5b3e990f85eb034faa461e691e719e8ce9e2a3c8 - Patch
References () https://git.kernel.org/stable/c/69a30b2ed620c2206cbbd1e9c112e4fc584e02bd - () https://git.kernel.org/stable/c/69a30b2ed620c2206cbbd1e9c112e4fc584e02bd - Patch
References () https://git.kernel.org/stable/c/8f64e84924604bb969ee1fbc4b8d7d09b9214889 - () https://git.kernel.org/stable/c/8f64e84924604bb969ee1fbc4b8d7d09b9214889 - Patch
References () https://git.kernel.org/stable/c/9b59588d8be91c96bfb0371e912ceb4f16315dbf - () https://git.kernel.org/stable/c/9b59588d8be91c96bfb0371e912ceb4f16315dbf - Patch
References () https://git.kernel.org/stable/c/aab25b669cb9fd3698c2631be4435f4fe92d9e59 - () https://git.kernel.org/stable/c/aab25b669cb9fd3698c2631be4435f4fe92d9e59 - Patch
References () https://git.kernel.org/stable/c/d5422f323858cad3ac3581075f9a3a5e0d41c0d8 - () https://git.kernel.org/stable/c/d5422f323858cad3ac3581075f9a3a5e0d41c0d8 - Patch
CWE NVD-CWE-Other

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-17 20:43


NVD link : CVE-2022-49382

Mitre link : CVE-2022-49382

CVE.ORG link : CVE-2022-49382


JSON object : View

Products Affected

linux

  • linux_kernel