CVE-2022-49354

In the Linux kernel, the following vulnerability has been resolved: ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe of_find_device_by_node() takes reference, we should use put_device() to release it when not need anymore. Add missing put_device() to avoid refcount leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*

History

14 Apr 2025, 19:44

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*
CWE NVD-CWE-Other
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ata: pata_octeon_cf: se corrige la pérdida de recuento de referencias en octeon_cf_probe. La referencia que toma la función de _find_device_by_node() se debe liberar cuando ya no se necesite. Se agrega la función put_device() que falta para evitar la pérdida de recuento de referencias.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/10d6bdf532902be1d8aa5900b3c03c5671612aa2 - () https://git.kernel.org/stable/c/10d6bdf532902be1d8aa5900b3c03c5671612aa2 - Patch
References () https://git.kernel.org/stable/c/19cb3ece14547cb1ca2021798aaf49a3f82643d1 - () https://git.kernel.org/stable/c/19cb3ece14547cb1ca2021798aaf49a3f82643d1 - Patch
References () https://git.kernel.org/stable/c/7bd85c5ba1687daf54e3b6907673c3604b1e75cf - () https://git.kernel.org/stable/c/7bd85c5ba1687daf54e3b6907673c3604b1e75cf - Patch
References () https://git.kernel.org/stable/c/888312dc297a8a103f6371ef668c7e04f57a7679 - () https://git.kernel.org/stable/c/888312dc297a8a103f6371ef668c7e04f57a7679 - Patch
References () https://git.kernel.org/stable/c/8d8ad067b90f231b8fdb14acee673ca4012f6045 - () https://git.kernel.org/stable/c/8d8ad067b90f231b8fdb14acee673ca4012f6045 - Patch
References () https://git.kernel.org/stable/c/a4d3e5f1d7d4f8b5e3834fec0f057a762c55806b - () https://git.kernel.org/stable/c/a4d3e5f1d7d4f8b5e3834fec0f057a762c55806b - Patch
References () https://git.kernel.org/stable/c/c9782e1b21bee4b783a64b2a91e7e71406c21a21 - () https://git.kernel.org/stable/c/c9782e1b21bee4b783a64b2a91e7e71406c21a21 - Patch
References () https://git.kernel.org/stable/c/d5a1e7f33c88780b279835d63665d7e38ccb671f - () https://git.kernel.org/stable/c/d5a1e7f33c88780b279835d63665d7e38ccb671f - Patch
References () https://git.kernel.org/stable/c/fb2cb409b504bb3a69e65a17f3120328c8e50219 - () https://git.kernel.org/stable/c/fb2cb409b504bb3a69e65a17f3120328c8e50219 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 19:44


NVD link : CVE-2022-49354

Mitre link : CVE-2022-49354

CVE.ORG link : CVE-2022-49354


JSON object : View

Products Affected

linux

  • linux_kernel