CVE-2022-49621

In the Linux kernel, the following vulnerability has been resolved: cpufreq: pmac32-cpufreq: Fix refcount leak bug In pmac_cpufreq_init_MacRISC3(), we need to add corresponding of_node_put() for the three node pointers whose refcount have been incremented by of_find_node_by_name().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*

History

11 Mar 2025, 22:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq: pmac32-cpufreq: Corregir error de pérdida de recuento de referencias En pmac_cpufreq_init_MacRISC3(), necesitamos agregar of_node_put() correspondiente para los tres punteros de nodo cuyo recuento de referencias se ha incrementado mediante of_find_node_by_name().
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*
CWE NVD-CWE-Other
References () https://git.kernel.org/stable/c/37c16fc2cb13a13f3c0193bfc6f2edef7d7df7d7 - () https://git.kernel.org/stable/c/37c16fc2cb13a13f3c0193bfc6f2edef7d7df7d7 - Patch
References () https://git.kernel.org/stable/c/3ea9dbf7c2f436952bca331c6f5d72f75aca224e - () https://git.kernel.org/stable/c/3ea9dbf7c2f436952bca331c6f5d72f75aca224e - Patch
References () https://git.kernel.org/stable/c/4513018d0bd739097570d26a7760551cba3deb56 - () https://git.kernel.org/stable/c/4513018d0bd739097570d26a7760551cba3deb56 - Patch
References () https://git.kernel.org/stable/c/4585890ab2dbf455d80e254d3d859d4c1e357920 - () https://git.kernel.org/stable/c/4585890ab2dbf455d80e254d3d859d4c1e357920 - Patch
References () https://git.kernel.org/stable/c/4f242486bf46d314b2e3838cc64b56f008a3c4d7 - () https://git.kernel.org/stable/c/4f242486bf46d314b2e3838cc64b56f008a3c4d7 - Patch
References () https://git.kernel.org/stable/c/57289b6601fe78c09921599b042a0b430fb420ec - () https://git.kernel.org/stable/c/57289b6601fe78c09921599b042a0b430fb420ec - Patch
References () https://git.kernel.org/stable/c/8dda30f81c751b01cd71f2cfaeef26ad4393b1d1 - () https://git.kernel.org/stable/c/8dda30f81c751b01cd71f2cfaeef26ad4393b1d1 - Patch
References () https://git.kernel.org/stable/c/ccd7567d4b6cf187fdfa55f003a9e461ee629e36 - () https://git.kernel.org/stable/c/ccd7567d4b6cf187fdfa55f003a9e461ee629e36 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-11 22:18


NVD link : CVE-2022-49621

Mitre link : CVE-2022-49621

CVE.ORG link : CVE-2022-49621


JSON object : View

Products Affected

linux

  • linux_kernel