CVE-2022-49681

In the Linux kernel, the following vulnerability has been resolved: xtensa: xtfpga: Fix refcount leak bug in setup In machine_setup(), of_find_compatible_node() will return a node pointer with refcount incremented. We should use of_node_put() when it is not used anymore.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*

History

11 Mar 2025, 22:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xtensa: xtfpga: Se corrige el error de pérdida de recuento de referencias en la configuración. En machine_setup(), of_find_compatible_node() devolverá un puntero de nodo con el recuento de referencias incrementado. Deberíamos usar of_node_put() cuando ya no se use.
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0162451723178602c37f0555d235dfa17e486112 - () https://git.kernel.org/stable/c/0162451723178602c37f0555d235dfa17e486112 - Patch
References () https://git.kernel.org/stable/c/0715d0e60052662c3f225342062f174dd721d1c7 - () https://git.kernel.org/stable/c/0715d0e60052662c3f225342062f174dd721d1c7 - Patch
References () https://git.kernel.org/stable/c/173940b3ae40114d4179c251a98ee039dc9cd5b3 - () https://git.kernel.org/stable/c/173940b3ae40114d4179c251a98ee039dc9cd5b3 - Patch
References () https://git.kernel.org/stable/c/35d7e961be68732eb3acaeba81fb81ca16eafd05 - () https://git.kernel.org/stable/c/35d7e961be68732eb3acaeba81fb81ca16eafd05 - Patch
References () https://git.kernel.org/stable/c/6c0839cf1b9e1b3c88da6af76794583cbfae8da3 - () https://git.kernel.org/stable/c/6c0839cf1b9e1b3c88da6af76794583cbfae8da3 - Patch
References () https://git.kernel.org/stable/c/9b30c5c8884eda3f541229899671cebbad15979b - () https://git.kernel.org/stable/c/9b30c5c8884eda3f541229899671cebbad15979b - Patch
References () https://git.kernel.org/stable/c/a52972ee706b438302eb0350e61f378eb191e3d1 - () https://git.kernel.org/stable/c/a52972ee706b438302eb0350e61f378eb191e3d1 - Patch
References () https://git.kernel.org/stable/c/b12d5c52f073a0420622aaf2f21b615cce8b36cc - () https://git.kernel.org/stable/c/b12d5c52f073a0420622aaf2f21b615cce8b36cc - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-11 22:16


NVD link : CVE-2022-49681

Mitre link : CVE-2022-49681

CVE.ORG link : CVE-2022-49681


JSON object : View

Products Affected

linux

  • linux_kernel