CVE-2022-49421

In the Linux kernel, the following vulnerability has been resolved: video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Sep 2025, 20:02

Type Values Removed Values Added
CWE NVD-CWE-Other
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: video: fbdev: clcdfb: Se corrige la pérdida de recuento de referencias en clcdfb_of_vram_setup of_parse_phandle() devuelve un puntero de nodo con el recuento de referencias incrementado, deberíamos usar of_node_put() en él cuando ya no lo necesitemos. Agregue of_node_put() faltante para evitar la pérdida de recuento de referencias.
References () https://git.kernel.org/stable/c/2e2e2c71b2642289438392edbf5d08cdbc0b138b - () https://git.kernel.org/stable/c/2e2e2c71b2642289438392edbf5d08cdbc0b138b - Patch
References () https://git.kernel.org/stable/c/38d245cebf545338a6bc1c7762023de3fbecd7b7 - () https://git.kernel.org/stable/c/38d245cebf545338a6bc1c7762023de3fbecd7b7 - Patch
References () https://git.kernel.org/stable/c/51eb1bb6baeb478538dd4ec6459fd68c44a855b1 - () https://git.kernel.org/stable/c/51eb1bb6baeb478538dd4ec6459fd68c44a855b1 - Patch
References () https://git.kernel.org/stable/c/6c92711db7c90f78e0b67ac2a8944d0fe7e12d83 - () https://git.kernel.org/stable/c/6c92711db7c90f78e0b67ac2a8944d0fe7e12d83 - Patch
References () https://git.kernel.org/stable/c/8db59df7f5826e104db82cfddbf22a33a151193e - () https://git.kernel.org/stable/c/8db59df7f5826e104db82cfddbf22a33a151193e - Patch
References () https://git.kernel.org/stable/c/b23789a59fa6f00e98a319291819f91fbba0deb8 - () https://git.kernel.org/stable/c/b23789a59fa6f00e98a319291819f91fbba0deb8 - Patch
References () https://git.kernel.org/stable/c/bbb2a24e863b6a10129546a0a4ceea2f07deec39 - () https://git.kernel.org/stable/c/bbb2a24e863b6a10129546a0a4ceea2f07deec39 - Patch
References () https://git.kernel.org/stable/c/c1c4405222b6fc98c16e8c2aa679c14e41d81465 - () https://git.kernel.org/stable/c/c1c4405222b6fc98c16e8c2aa679c14e41d81465 - Patch
References () https://git.kernel.org/stable/c/f2dfb4ab887d67be7d0892ba041d3c8d738d3356 - () https://git.kernel.org/stable/c/f2dfb4ab887d67be7d0892ba041d3c8d738d3356 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-09-22 20:02


NVD link : CVE-2022-49421

Mitre link : CVE-2022-49421

CVE.ORG link : CVE-2022-49421


JSON object : View

Products Affected

linux

  • linux_kernel