CVE-2022-49447

In the Linux kernel, the following vulnerability has been resolved: ARM: hisi: Add missing of_node_put after of_find_compatible_node of_find_compatible_node will increment the refcount of the returned device_node. Calling of_node_put() to avoid the refcount leak
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2025, 16:12

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-Other
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: hisi: Agregar la falta de of_node_put después de of_find_compatible_node of_find_compatible_node incrementará el recuento de referencias del device_node devuelto. Llamar a of_node_put() para evitar la pérdida de recuento de referencias
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/21a3effe446dd6dc5eed7fe897c2f9b88c9a5d6d - () https://git.kernel.org/stable/c/21a3effe446dd6dc5eed7fe897c2f9b88c9a5d6d - Patch
References () https://git.kernel.org/stable/c/45d211668d33c49d73f5213e8c2b58468108647c - () https://git.kernel.org/stable/c/45d211668d33c49d73f5213e8c2b58468108647c - Patch
References () https://git.kernel.org/stable/c/46cb7868811d025c3d29c10d18b3422db1cf20d5 - () https://git.kernel.org/stable/c/46cb7868811d025c3d29c10d18b3422db1cf20d5 - Patch
References () https://git.kernel.org/stable/c/9bc72e47d4630d58a840a66a869c56b29554cfe4 - () https://git.kernel.org/stable/c/9bc72e47d4630d58a840a66a869c56b29554cfe4 - Patch
References () https://git.kernel.org/stable/c/a3265a9440030068547a20dfee646666f3ca5278 - () https://git.kernel.org/stable/c/a3265a9440030068547a20dfee646666f3ca5278 - Patch
References () https://git.kernel.org/stable/c/cafaaae4bb9ce84a2791fa29bf6907a9466c3883 - () https://git.kernel.org/stable/c/cafaaae4bb9ce84a2791fa29bf6907a9466c3883 - Patch
References () https://git.kernel.org/stable/c/dd4be8ecfb41a29e7c4e551b4e866157ce4a3429 - () https://git.kernel.org/stable/c/dd4be8ecfb41a29e7c4e551b4e866157ce4a3429 - Patch
References () https://git.kernel.org/stable/c/e109058165137ef42841abd989f080adfefa14fa - () https://git.kernel.org/stable/c/e109058165137ef42841abd989f080adfefa14fa - Patch
References () https://git.kernel.org/stable/c/f8da78b2bae1f54746647a2bb44f8bd6025c57af - () https://git.kernel.org/stable/c/f8da78b2bae1f54746647a2bb44f8bd6025c57af - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-03-17 16:12


NVD link : CVE-2022-49447

Mitre link : CVE-2022-49447

CVE.ORG link : CVE-2022-49447


JSON object : View

Products Affected

linux

  • linux_kernel