In the Linux kernel, the following vulnerability has been resolved:
mISDN: fix misuse of put_device() in mISDN_register_device()
We should not release reference by put_device() before calling device_initialize().
References
Configurations
Configuration 1 (hide)
|
History
10 Nov 2025, 20:58
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/2d25107e111a85c56f601a5470f1780ec054e6ac - Patch | |
| References | () https://git.kernel.org/stable/c/44658d65f6b3118f595a1229d7eed74845a5e2ac - Patch | |
| References | () https://git.kernel.org/stable/c/596230471da3415e92ae6b9d2a4e26f4a81cac5a - Patch | |
| References | () https://git.kernel.org/stable/c/709aa1f73d3e9e9ea16e2c4e44f2874c5d2c382c - Patch | |
| References | () https://git.kernel.org/stable/c/81db4f182744acd004f17d7cc52dde9ea53467e6 - Patch | |
| References | () https://git.kernel.org/stable/c/83672c1b83d107b0d4fe0accf1bf64d8988398e6 - Patch | |
| References | () https://git.kernel.org/stable/c/87b336aa158201dc30a318431e63e8c5b26c4156 - Patch | |
| References | () https://git.kernel.org/stable/c/d40b35a7922f4df3767ad6fb8ef3dc86e31d7ba3 - Patch |
02 May 2025, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
01 May 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-01 15:16
Updated : 2025-11-10 20:58
NVD link : CVE-2022-49818
Mitre link : CVE-2022-49818
CVE.ORG link : CVE-2022-49818
JSON object : View
Products Affected
linux
- linux_kernel
CWE
