CVE-2022-49712

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak. of_node_put() will check NULL pointer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*

History

11 Mar 2025, 21:58

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*
CWE NVD-CWE-Other
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: lpc32xx_udc: Se corrige la pérdida de recuento de referencias en lpc32xx_udc_probe of_parse_phandle() devuelve un puntero de nodo con el recuento de referencias incrementado, deberíamos usar of_node_put() en él cuando ya no lo necesitemos. Agregue of_node_put() faltante para evitar la pérdida de recuento de referencias. of_node_put() verificará el puntero NULL.
References () https://git.kernel.org/stable/c/0ef6917c0524da5b88496b9706628ffef108b9bb - () https://git.kernel.org/stable/c/0ef6917c0524da5b88496b9706628ffef108b9bb - Patch
References () https://git.kernel.org/stable/c/2a598da14856ead80c726b38ba426c68637d9211 - () https://git.kernel.org/stable/c/2a598da14856ead80c726b38ba426c68637d9211 - Patch
References () https://git.kernel.org/stable/c/46da1e4a8b6329479433b2a4056941dfdd7f3efd - () https://git.kernel.org/stable/c/46da1e4a8b6329479433b2a4056941dfdd7f3efd - Patch
References () https://git.kernel.org/stable/c/4757c9ade34178b351580133771f510b5ffcf9c8 - () https://git.kernel.org/stable/c/4757c9ade34178b351580133771f510b5ffcf9c8 - Patch
References () https://git.kernel.org/stable/c/57901c658f77d9ea2e772f35cb38e47efb54c558 - () https://git.kernel.org/stable/c/57901c658f77d9ea2e772f35cb38e47efb54c558 - Patch
References () https://git.kernel.org/stable/c/727c82d003e0ec64411fd1257a9a57de4ad7a99a - () https://git.kernel.org/stable/c/727c82d003e0ec64411fd1257a9a57de4ad7a99a - Patch
References () https://git.kernel.org/stable/c/b75bddfcc18170ce8e3fb695a76ec2dec4ce0ea5 - () https://git.kernel.org/stable/c/b75bddfcc18170ce8e3fb695a76ec2dec4ce0ea5 - Patch
References () https://git.kernel.org/stable/c/d85e4e6284a91aa2d1ab004e9d84b9c09b4aa203 - () https://git.kernel.org/stable/c/d85e4e6284a91aa2d1ab004e9d84b9c09b4aa203 - Patch
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-11 21:58


NVD link : CVE-2022-49712

Mitre link : CVE-2022-49712

CVE.ORG link : CVE-2022-49712


JSON object : View

Products Affected

linux

  • linux_kernel