ghsa-g72j-3qqx-86gg
Vulnerability from github
Published
2025-03-17 21:30
Modified
2025-03-17 21:30
Details

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe

This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2022-49185"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-02-26T07:00:55Z",
    "severity": "MODERATE"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe\n\nThis node pointer is returned by of_parse_phandle() with refcount\nincremented in this function. Calling of_node_put() to avoid\nthe refcount leak.",
  "id": "GHSA-g72j-3qqx-86gg",
  "modified": "2025-03-17T21:30:31Z",
  "published": "2025-03-17T21:30:31Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49185"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/0067ba448f1c29ca06e5aee00d8506889ed1f9d0"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/0356d4b64a03d23daf99a2a29d7d7d91d6ec2ea8"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/59250d547542f1c7765a78dc97ddfe5e6b0d2ab0"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/62580a40c9bef3d8a90629c64dda381344b35ffd"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/669b05ff43bd7ed684379c6e2006a6dad5127b71"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9511c6018cd772668def8b034bc67269847e591a"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/bc1e29a35147c1ba6ea2b06a16cb0028f7c852d2"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c09ac191b1f97cfa06f394dbfd7a5db07986cefc"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c52703355766c347f270df222a744e0c491a02f2"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…