CVE-2022-49386
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
17/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks<br />
<br />
of_get_child_by_name() returns a node pointer with refcount<br />
incremented, we should use of_node_put() on it when not need anymore.<br />
am65_cpsw_init_cpts() and am65_cpsw_nuss_probe() don&#39;t release<br />
the refcount in error case.<br />
Add missing of_node_put() to avoid refcount leak.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.10.122 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.47 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.17.15 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.18 (including) | 5.18.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2e44f21c384503562713b7d3b673c40bed20af3d
- https://git.kernel.org/stable/c/5dd89d2fc438457811cbbec07999ce0d80051ff5
- https://git.kernel.org/stable/c/78aca10a16f001c9f49f1cc4dadfee8d444bb173
- https://git.kernel.org/stable/c/a4b7ef3b159805ba6be061d0cd2403d84b9b0063
- https://git.kernel.org/stable/c/f7ba2cc57f404d2d9f26fb85bd3833d35a477829