CVE-2022-49396

In the Linux kernel, the following vulnerability has been resolved: phy: qcom-qmp: fix reset-controller leak on probe errors Make sure to release the lane reset controller in case of a late probe error (e.g. probe deferral). Note that due to the reset controller being defined in devicetree in "lane" child nodes, devm_reset_control_get_exclusive() cannot be used directly.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

22 Sep 2025, 19:47

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE CWE-401
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: phy: qcom-qmp: se corrige la pérdida del controlador de reinicio en los errores de sondeo Asegúrese de liberar el controlador de reinicio de carril en caso de un error de sondeo tardío (por ejemplo, aplazamiento de sondeo). Tenga en cuenta que debido a que el controlador de reinicio se define en devicetree en los nodos secundarios "lane", devm_reset_control_get_exclusive() no se puede usar directamente.
References () https://git.kernel.org/stable/c/2156dc390402043ba5982489c6625adcb0b0975c - () https://git.kernel.org/stable/c/2156dc390402043ba5982489c6625adcb0b0975c - Patch
References () https://git.kernel.org/stable/c/4d2900f20edfe541f75756a00deeb2ffe7c66bc1 - () https://git.kernel.org/stable/c/4d2900f20edfe541f75756a00deeb2ffe7c66bc1 - Patch
References () https://git.kernel.org/stable/c/7ac21b24af859c097eb4034e93430056068f8f31 - () https://git.kernel.org/stable/c/7ac21b24af859c097eb4034e93430056068f8f31 - Patch
References () https://git.kernel.org/stable/c/8c03eb0c8982677b4e17174073a011788891304d - () https://git.kernel.org/stable/c/8c03eb0c8982677b4e17174073a011788891304d - Patch
References () https://git.kernel.org/stable/c/a39d9eccb333b8c07c43ebea1c6dfda122378a0f - () https://git.kernel.org/stable/c/a39d9eccb333b8c07c43ebea1c6dfda122378a0f - Patch
References () https://git.kernel.org/stable/c/b7b5fbcaac5355e2e695dc0c08a0fcf248250388 - () https://git.kernel.org/stable/c/b7b5fbcaac5355e2e695dc0c08a0fcf248250388 - Patch
References () https://git.kernel.org/stable/c/ba173a6f8d8dffed64bb13ab23081bdddfb464f0 - () https://git.kernel.org/stable/c/ba173a6f8d8dffed64bb13ab23081bdddfb464f0 - Patch
References () https://git.kernel.org/stable/c/feb05b10b3ed3ae21b851520a0d0b71685439517 - () https://git.kernel.org/stable/c/feb05b10b3ed3ae21b851520a0d0b71685439517 - Patch

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-09-22 19:47


NVD link : CVE-2022-49396

Mitre link : CVE-2022-49396

CVE.ORG link : CVE-2022-49396


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime