CVE-2022-49821

In the Linux kernel, the following vulnerability has been resolved: mISDN: fix possible memory leak in mISDN_dsp_element_register() Afer commit 1fa5ae857bb1 ("driver core: get rid of struct device's bus_id string array"), the name of device is allocated dynamically, use put_device() to give up the reference, so that the name can be freed in kobject_cleanup() when the refcount is 0. The 'entry' is going to be freed in mISDN_dsp_dev_release(), so the kfree() is removed. list_del() is called in mISDN_dsp_dev_release(), so it need be initialized.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*

History

10 Nov 2025, 20:17

Type Values Removed Values Added
CWE CWE-401
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/083a2c9ef82e184bdf0b9f9a1e5fc38d32afbb47 - () https://git.kernel.org/stable/c/083a2c9ef82e184bdf0b9f9a1e5fc38d32afbb47 - Patch
References () https://git.kernel.org/stable/c/0f2c681900a01e3f23789bca26d88268c3d5b51d - () https://git.kernel.org/stable/c/0f2c681900a01e3f23789bca26d88268c3d5b51d - Patch
References () https://git.kernel.org/stable/c/727ed7d28348c026c7ef4d852f3d0e5054d376e8 - () https://git.kernel.org/stable/c/727ed7d28348c026c7ef4d852f3d0e5054d376e8 - Patch
References () https://git.kernel.org/stable/c/7a05e3929668c8cfef495c69752a9e91fac4878f - () https://git.kernel.org/stable/c/7a05e3929668c8cfef495c69752a9e91fac4878f - Patch
References () https://git.kernel.org/stable/c/98a2ac1ca8fd6eca6867726fe238d06e75eb1acd - () https://git.kernel.org/stable/c/98a2ac1ca8fd6eca6867726fe238d06e75eb1acd - Patch
References () https://git.kernel.org/stable/c/b119bedbefb7dd9ed8bf8cb9f1056504250d610e - () https://git.kernel.org/stable/c/b119bedbefb7dd9ed8bf8cb9f1056504250d610e - Patch
References () https://git.kernel.org/stable/c/bbd53d05c4c892080ef3b617eff4f57903acecb9 - () https://git.kernel.org/stable/c/bbd53d05c4c892080ef3b617eff4f57903acecb9 - Patch
References () https://git.kernel.org/stable/c/d4b8394725079670be309f9a35ad88a8cbbaaefd - () https://git.kernel.org/stable/c/d4b8394725079670be309f9a35ad88a8cbbaaefd - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mISDN: corrige posible pérdida de memoria en mISDN_dsp_element_register() Después de la confirmación 1fa5ae857bb1 ("núcleo del controlador: deshacerse de la matriz de cadenas bus_id del dispositivo struct"), el nombre del dispositivo se asigna dinámicamente, use put_device() para renunciar a la referencia, de modo que el nombre se pueda liberar en kobject_cleanup() cuando refcount sea 0. La 'entrada' se liberará en mISDN_dsp_dev_release(), por lo que se elimina kfree(). list_del() se llama en mISDN_dsp_dev_release(), por lo que necesita inicializarse.

01 May 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 15:16

Updated : 2025-11-10 20:17


NVD link : CVE-2022-49821

Mitre link : CVE-2022-49821

CVE.ORG link : CVE-2022-49821


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime