CVE-2022-49716

In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions of_get_child_by_name() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. When kcalloc fails, it missing of_node_put() and results in refcount leak. Fix this by goto out_put_node label.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*

History

11 Mar 2025, 21:59

Type Values Removed Values Added
CWE NVD-CWE-Other
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: irqchip/gic-v3: Se ha corregido el error de gestión en gic_populate_ppi_partitions. of_get_child_by_name() devuelve un puntero de nodo con refcount incrementado. Deberíamos usar of_node_put() en él cuando ya no lo necesitemos. Cuando kcalloc falla, falta of_node_put() y da como resultado una fuga de refcount. Corrija esto pasando a la etiqueta out_put_node.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/0b325d993995a321f6ab4e6c51f0504ec092bf5b - () https://git.kernel.org/stable/c/0b325d993995a321f6ab4e6c51f0504ec092bf5b - Patch
References () https://git.kernel.org/stable/c/58e67c81e229351027d28c610638378606e33a08 - () https://git.kernel.org/stable/c/58e67c81e229351027d28c610638378606e33a08 - Patch
References () https://git.kernel.org/stable/c/7c9dd9d23f26dabcfb14148b9acdfba540418b19 - () https://git.kernel.org/stable/c/7c9dd9d23f26dabcfb14148b9acdfba540418b19 - Patch
References () https://git.kernel.org/stable/c/c83c34c57798fc41faefcf078be78683db2f4beb - () https://git.kernel.org/stable/c/c83c34c57798fc41faefcf078be78683db2f4beb - Patch
References () https://git.kernel.org/stable/c/ec8401a429ffee34ccf38cebf3443f8d5ae6cb0d - () https://git.kernel.org/stable/c/ec8401a429ffee34ccf38cebf3443f8d5ae6cb0d - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-11 21:59


NVD link : CVE-2022-49716

Mitre link : CVE-2022-49716

CVE.ORG link : CVE-2022-49716


JSON object : View

Products Affected

linux

  • linux_kernel