CVE-2022-49399

In the Linux kernel, the following vulnerability has been resolved: tty: goldfish: Use tty_port_destroy() to destroy port In goldfish_tty_probe(), the port initialized through tty_port_init() should be destroyed in error paths.In goldfish_tty_remove(), qtty->port also should be destroyed or else might leak resources. Fix the above by calling tty_port_destroy().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Oct 2025, 12:14

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: goldfish: Use tty_port_destroy() para destruir el puerto En goldfish_tty_probe(), el puerto inicializado a través de tty_port_init() debe destruirse en las rutas de error. En goldfish_tty_remove(), qtty->port también debe destruirse o, de lo contrario, podría perder recursos. Corrija lo anterior llamando a tty_port_destroy().
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/241fcb79dd1df276d80b19f5f6acc9eaaaa63309 - () https://git.kernel.org/stable/c/241fcb79dd1df276d80b19f5f6acc9eaaaa63309 - Patch
References () https://git.kernel.org/stable/c/326192b99c903a2193d820c30ed936cc2402382c - () https://git.kernel.org/stable/c/326192b99c903a2193d820c30ed936cc2402382c - Patch
References () https://git.kernel.org/stable/c/45f6ce70abfb7ccf9d787781cbc4c03294a775a1 - () https://git.kernel.org/stable/c/45f6ce70abfb7ccf9d787781cbc4c03294a775a1 - Patch
References () https://git.kernel.org/stable/c/4639d1b992de8f37d66f698056875c274efcd45f - () https://git.kernel.org/stable/c/4639d1b992de8f37d66f698056875c274efcd45f - Patch
References () https://git.kernel.org/stable/c/507b05063d1b7a1fcb9f7d7c47586fc4f3508f98 - () https://git.kernel.org/stable/c/507b05063d1b7a1fcb9f7d7c47586fc4f3508f98 - Patch
References () https://git.kernel.org/stable/c/9ae3d073f7db5578ae1907544f0c15947e9678e6 - () https://git.kernel.org/stable/c/9ae3d073f7db5578ae1907544f0c15947e9678e6 - Patch
References () https://git.kernel.org/stable/c/da64f419d7f78272bfe40dde1262602d4ff6b32c - () https://git.kernel.org/stable/c/da64f419d7f78272bfe40dde1262602d4ff6b32c - Patch
References () https://git.kernel.org/stable/c/ee6c33b29e624f515202a31bf6ef0437f26a1867 - () https://git.kernel.org/stable/c/ee6c33b29e624f515202a31bf6ef0437f26a1867 - Patch
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-10-21 12:14


NVD link : CVE-2022-49399

Mitre link : CVE-2022-49399

CVE.ORG link : CVE-2022-49399


JSON object : View

Products Affected

linux

  • linux_kernel