CVE-2022-49818

In the Linux kernel, the following vulnerability has been resolved: mISDN: fix misuse of put_device() in mISDN_register_device() We should not release reference by put_device() before calling device_initialize().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

10 Nov 2025, 20:58

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:4.14.299:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.9.333:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.4.224:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/2d25107e111a85c56f601a5470f1780ec054e6ac - () https://git.kernel.org/stable/c/2d25107e111a85c56f601a5470f1780ec054e6ac - Patch
References () https://git.kernel.org/stable/c/44658d65f6b3118f595a1229d7eed74845a5e2ac - () https://git.kernel.org/stable/c/44658d65f6b3118f595a1229d7eed74845a5e2ac - Patch
References () https://git.kernel.org/stable/c/596230471da3415e92ae6b9d2a4e26f4a81cac5a - () https://git.kernel.org/stable/c/596230471da3415e92ae6b9d2a4e26f4a81cac5a - Patch
References () https://git.kernel.org/stable/c/709aa1f73d3e9e9ea16e2c4e44f2874c5d2c382c - () https://git.kernel.org/stable/c/709aa1f73d3e9e9ea16e2c4e44f2874c5d2c382c - Patch
References () https://git.kernel.org/stable/c/81db4f182744acd004f17d7cc52dde9ea53467e6 - () https://git.kernel.org/stable/c/81db4f182744acd004f17d7cc52dde9ea53467e6 - Patch
References () https://git.kernel.org/stable/c/83672c1b83d107b0d4fe0accf1bf64d8988398e6 - () https://git.kernel.org/stable/c/83672c1b83d107b0d4fe0accf1bf64d8988398e6 - Patch
References () https://git.kernel.org/stable/c/87b336aa158201dc30a318431e63e8c5b26c4156 - () https://git.kernel.org/stable/c/87b336aa158201dc30a318431e63e8c5b26c4156 - Patch
References () https://git.kernel.org/stable/c/d40b35a7922f4df3767ad6fb8ef3dc86e31d7ba3 - () https://git.kernel.org/stable/c/d40b35a7922f4df3767ad6fb8ef3dc86e31d7ba3 - Patch

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mISDN: corregir el uso incorrecto de put_device() en mISDN_register_device() No debemos liberar la referencia de put_device() antes de llamar a device_initialize().

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-11-10 20:58


NVD link : CVE-2022-49818

Mitre link : CVE-2022-49818

CVE.ORG link : CVE-2022-49818


JSON object : View

Products Affected

linux

  • linux_kernel