In the Linux kernel, the following vulnerability has been resolved:
tty: goldfish: Use tty_port_destroy() to destroy port
In goldfish_tty_probe(), the port initialized through tty_port_init()
should be destroyed in error paths.In goldfish_tty_remove(), qtty->port
also should be destroyed or else might leak resources.
Fix the above by calling tty_port_destroy().
References
Configurations
Configuration 1 (hide)
|
History
21 Oct 2025, 12:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/241fcb79dd1df276d80b19f5f6acc9eaaaa63309 - Patch | |
| References | () https://git.kernel.org/stable/c/326192b99c903a2193d820c30ed936cc2402382c - Patch | |
| References | () https://git.kernel.org/stable/c/45f6ce70abfb7ccf9d787781cbc4c03294a775a1 - Patch | |
| References | () https://git.kernel.org/stable/c/4639d1b992de8f37d66f698056875c274efcd45f - Patch | |
| References | () https://git.kernel.org/stable/c/507b05063d1b7a1fcb9f7d7c47586fc4f3508f98 - Patch | |
| References | () https://git.kernel.org/stable/c/9ae3d073f7db5578ae1907544f0c15947e9678e6 - Patch | |
| References | () https://git.kernel.org/stable/c/da64f419d7f78272bfe40dde1262602d4ff6b32c - Patch | |
| References | () https://git.kernel.org/stable/c/ee6c33b29e624f515202a31bf6ef0437f26a1867 - Patch | |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
26 Feb 2025, 07:01
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-10-21 12:14
NVD link : CVE-2022-49399
Mitre link : CVE-2022-49399
CVE.ORG link : CVE-2022-49399
JSON object : View
Products Affected
linux
- linux_kernel
CWE
