CVE-2022-49591

In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: ksz_common: Fix refcount leak bug In ksz_switch_register(), we should call of_node_put() for the reference returned by of_get_child_by_name() which has increased the refcount.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*

History

10 Mar 2025, 20:23

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE NVD-CWE-Other
References () https://git.kernel.org/stable/c/4165e02716518bbbe9c9104b39530d40928bc7ce - () https://git.kernel.org/stable/c/4165e02716518bbbe9c9104b39530d40928bc7ce - Mailing List, Patch
References () https://git.kernel.org/stable/c/88ec2ff42da3ac93b2437dc52fe25cd4372148e6 - () https://git.kernel.org/stable/c/88ec2ff42da3ac93b2437dc52fe25cd4372148e6 - Mailing List, Patch
References () https://git.kernel.org/stable/c/a14bd7475452c51835dd5a0cee4c8fa48dd0b539 - () https://git.kernel.org/stable/c/a14bd7475452c51835dd5a0cee4c8fa48dd0b539 - Mailing List, Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: microchip: ksz_common: Se corrige el error de pérdida de recuento de referencias. En ksz_switch_register(), debemos llamar a of_node_put() para la referencia devuelta por of_get_child_by_name() que ha aumentado el recuento de referencias.

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-10 20:23


NVD link : CVE-2022-49591

Mitre link : CVE-2022-49591

CVE.ORG link : CVE-2022-49591


JSON object : View

Products Affected

linux

  • linux_kernel